Leveraging ISA/IEC 62443 to safe industrial operations is simpler than you assume


To many individuals, the ISA99/IEC 62443 industrial safety customary is sort of a New 12 months’s decision: You recognize it’s going to convey you nice advantages, so that you begin engaged on it, however you ultimately surrender as a result of it seems to be advanced or different priorities come up. Nevertheless it actually shouldn’t be like that. Let me clarify why.

Industrial networks and demanding infrastructures have develop into the brand new playground for cyber criminals. Whether or not you run international manufacturing operations, a neighborhood water utility, an influence grid community or only a small industrial plant in the course of nowhere, you’re eligible for a cyber assault. What can be the consequence? Manufacturing halts, lack of income loss, damaged industrial tools, harm to the setting, and even injured staff. Nothing else must be greater in your precedence record than securing your industrial operations.

The Worldwide Society of Automation (ISA) and the Worldwide Electrotechnical Fee (IEC) have developed the ISA99/IEC 62443 collection of requirements. It’s a framework to implement industrial cybersecurity finest practices step-by-step and drive steady enchancment. The collection covers many features, however the important thing half is ISA/IEC 62443-3-3, which describes the safety capabilities it’s best to implement.

Some may assume that ISA/IEC 62443-3-3 is simply fitted to manufacturing operations, however most of its safety necessities apply to all trade verticals. Moreover, the ISA and IEC at the moment are engaged on creating profiles for particular industries, so no matter you implement right this moment might be leveraged tomorrow to adjust to a extra thorough record of necessities.

To drive you thru the ISA/IEC 62443-3-3, my colleagues Andrew McPhee and Maik Seewald have written a quick and detailed white paper itemizing all safety necessities and the right way to comply. The principle key takeaway is that by leveraging Cisco’s complete industrial networking and cybersecurity portfolio, implementing the usual couldn’t be simpler.

For instance, the ISA/IEC 62443-3-3 highlights the crucial of controlling entry to sources and limiting communications by imposing the least privilege precept that grants customers and units solely the rights they should carry out their duties. In a nutshell, asset identification, person authentication, and micro-segmentation are a should to scale back the publicity of the commercial management system (ICS) to cyberthreats and restrict the unfold of assaults.

Utilizing Cisco Id Providers Engine (ISE) along with Cisco Cyber Imaginative and prescient, Safe Firewall, and Duo, industrial organizations can simply implement this zero-trust strategy to their OT networks. These merchandise have been designed and examined collectively to allow seamless workflows and out-of-the-box integration. I instructed you it didn’t must be advanced!

On November 10, 2022, Andrew and Maik will current a webinar explaining the ISA/IEC 62443-3-3 and its safety necessities. Register now and you should definitely attend to find out about capabilities you is perhaps lacking right this moment and how one can simply implement them.

As a follow-up to this overview, we’ll see the right way to implement micro-segmentation in industrial networks in a second webinar. On December 6, 2022, we’ll dive into the ISA/IEC 62443 zones and conduits mannequin and present you the way Cisco ISE and Cyber Imaginative and prescient can implement OT micro-segmentation. Register right here.

Securing industrial operations additionally means leveraging IT safety instruments and processes. On December 15, the webinar closing the collection will focus on the right way to lengthen IT safety to industrial operations so safety analysts can examine and remediate threats throughout each IT and OT domains. Register right here.

Till then, take a look at our ISA/IEC 62443-3-3 white paper and be sure to subscribe to our Industrial Safety E-newsletter.



Leave a Reply