Shopping Cart

No products in the cart.

BSI PD IEC/TR 62443-2-3:2015

$198.66

Security for industrial automation and control systems – Patch management in the IACS environment

Published By Publication Date Number of Pages
BSI 2015 66
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of This part of IEC 62443 , which is a Technical Report, describes requirements for asset owners and industrial automation and control system (IACS) product suppliers that have established and are now maintaining an IACS patch management program.

This Technical Report recommends a defined format for the distribution of information about security patches from asset owners to IACS product suppliers, a definition of some of the activities associated with the development of the patch information by IACS product suppliers and deployment and installation of the patches by asset owners. The exchange format and activities are defined for use in security related patches; however, it may also be applicable for non-security related patches or updates.

The Technical Report does not differentiate between patches made available for the operating systems (OSs), applications or devices. It does not differentiate between the product suppliers that supply the infrastructure components or the IACS applications; it provides guidance for all patches applicable to the IACS. Additionally, the type of patch can be for the resolution of bugs, reliability issues, operability issues or security vulnerabilities.

NOTE 1

This Technical Report does not provide guidance on the ethics and approaches for the discovery and disclosure of security vulnerabilities affecting IACS. This is a general issue outside the scope of this report.

NOTE 2

This Technical Report does not provide guidance on the mitigation of vulnerabilities in the period between when the vulnerability is discovered and the date that the patch resolving the vulnerability is created. For guidance on multiple countermeasures to mitigate security risks as part of an IACS security management system (IACS-SMS), refer to, Annexes B.4.5, B.4.6 and B.8.5 in this Technical Report and other documents in the IEC 62443 series.

PDF Catalog

PDF Pages PDF Title
4 CONTENTS
7 FOREWORD
9 INTRODUCTION
10 1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms and acronyms
3.1 Terms and definitions
11 3.2 Abbreviated terms and acronyms
13 4 Industrial automation and control system patching
4.1 Patching problems faced in industrial automation and control systems
4.2 Impacts of poor patch management
14 4.3 Obsolete IACS patch management mitigation
4.4 Patch lifecycle state
Tables
Table 1 – Patch lifecycle states
15 5 Recommended requirements for asset owner
Figures
Figure 1 – Patch state model
16 6 Recommended requirements for IACS product supplier
7 Exchanging patch information
7.1 General
17 7.2 Patch information exchange format
7.3 Patch compatibility information filename convention
7.4 VPC file schema
18 Figure 2 – VPC file schema
19 7.5 VPC file element definitions
Figure 3 – VPC file schema diagram format
Table 2 – VPC XSD PatchData file elements
20 Table 3 – VPC XSD PatchVendor file elements
Table 4 – VPC XSD Patch file elements
22 Table 5 – VPC XSD VendorProduct file elements
23 Annex A (informative) VPC XSD file format
A.1 VPC XSD file format specification
25 A.2 Core component types
A.2.1 Overview
A.2.2 CodeType
26 A.2.3 DateTimeType
A.2.4 IdentifierType
Table A.1 – CodeType optional attributes
Table A.2 – DateTimeType optional attributes
27 A.2.5 IndicatorType
A.2.6 TextType
Table A.3 – IdentifierType optional attributes
Table A.4 – IndicatorType optional attributes
Table A.5 – TextType optional attributes
28 Annex B (informative) IACS asset owner guidance on patching
B.1 Annex organization
B.2 Overview
29 B.3 Information gathering
B.3.1 Inventory of existing environment
Figure B.1 – IACS patch management workflow
31 B.3.2 Tools for manual and automatic scanning
32 B.3.3 IACS product supplier contact and relationship building
33 Table B.1 – Sample product supplier profile
34 B.3.4 Supportability and product supplier product lifecycle
B.3.5 Evaluation and assessment of existing environment
35 B.3.6 Classification and categorization of assets/hardware/software
36 Table B.2 – Communication capabilities
37 Table B.3 – Sample software categorization
38 B.4 Project planning and implementation
B.4.1 Overview
Figure B.2 – Planning an IACS patch management process
39 B.4.2 Developing the business case
40 B.4.3 Establishing and assigning roles and responsibilities
41 Table B.4 – Responsibility assignment definitions
42 B.4.4 Testing environment and infrastructure
Figure B.3 – Sample responsibilities chart
43 B.4.5 Implement backup and restoration infrastructure
44 B.4.6 Establishing product supplier procurement guidelines
B.5 Monitoring and evaluation
B.5.1 Overview
Figure B.4 – Patch monitoring and evaluation process
45 B.5.2 Monitoring and identification of security related patches
B.5.3 Determining patch applicability
46 B.5.4 Impact, criticality and risk assessment
47 B.5.5 Decision for installation
B.6 Patch testing
B.6.1 Patch testing process
Figure B.5 – A patch testing process
Table B.5 – Sample severity based patch management timeframes
48 B.6.2 Asset owner qualification of security patches prior to installation
B.6.3 Determining patch file authenticity
B.6.4 Review functional and security changes from patches
49 B.6.5 Installation procedure
50 B.6.6 Patch qualification and validation
B.6.7 Patch removal, roll back, restoration procedures
51 B.6.8 Risk mitigation alternatives
52 B.7 Patch deployment and installation
B.7.1 Patch deployment and installation process
B.7.2 Notification of affected parties
Figure B.6 – A patch deployment and installation process
53 B.7.3 Preparation
B.7.4 Phased scheduling and installation
54 B.7.5 Verification of patch installation
B.7.6 Staff training and drills
55 B.8 Operating an IACS patch management program
B.8.1 Overview
B.8.2 Change management
B.8.3 Vulnerability awareness
56 B.8.4 Outage scheduling
B.8.5 Security hardening
B.8.6 Inventory and data maintenance
57 B.8.7 Procuring or adding new devices
B.8.8 Patch management reporting and KPIs
58 Annex C (informative) IACS product supplier / service provider guidance on patching
C.1 Annex organization
C.2 Discovery of vulnerabilities
C.2.1 General
59 C.2.2 Vulnerability discovery and identification within the product
C.2.3 Vulnerability discovery and identification within externally sourced product components
60 C.3 Development, verification and validation of security updates
C.4 Distribution of cyber security updates
C.5 Communication and outreach
62 Bibliography
BSI PD IEC/TR 62443-2-3:2015
$198.66