IEC/ISA 62443-4-2 checklist
Introduction
This checklist is a collection of steps to harden devices related to IEC/ISA 62443-4-2 which is connected to the IEC/ISA 62443-3-3 requirements. This specific checklist is a guidance for utilizing appropriate security capabilities in WeOS related to IEC/ISA 62443-4-2. It does not provide exact guidance since each environment are unique, has different requirements and therefore capabilities. This list could be used as input for the IEC/ISA 62443-3-3 or 62443-2-1 Factory Acceptance Test (FAT) checklist. Administrators are advised to evaluate each option for its potential risk before implementing the option.
As defined in IEC TS 62443-1-1 there are a total of seven foundational requirements (FRs). Each FR have defined requirements named component requirements (CR). Devices running WeOS are classified as a network device (NDR) which include additional requirements on top of all CRs.
Security Level (SL) are defined from 1 to 4 and describes the level of means, resources, skills and motivation that is reflected in the component capability.
- SL 1 – casual.
- SL 2 – simple means with low resources, generic skills and low motivation.
- SL 3 – sophisticated means with moderate resources, IACS specific skills and moderate motivation.
- SL 4 – sophisticated means with extended resources, IACS specific skills and high motivation.
Checklist
Security Level Target (SL-T) of this checklist is up to and including SL 2. Level of achieved SL (SL-A) depends on the implemented security capabilities, selected product and installed environment. (For further read and information, see Product Security Guide and Product Technical Specifications).
Related Foundational Requirement refers to:
- FR 1 - Identification & authentication control (IAC)
- FR 2 - Use control (UC)
- FR 3 - System integrity (SI)
- FR 4 - Data confidentiality (DC)
- FR 5 - Restricted data flow (RDF)
- FR 6 - Timely response to events (TRE)
- FR 7 - Resource availability (RA)
| Related Foundational Requirement | Description | Security Capability | Implemented (YES , NO , N/A) |
|---|---|---|---|
| FR 1 - IAC | For unique human user identification and authentication, remote authentication and/or local users has been configured | AAA | |
| FR 1 - IAC | Default authenticators has been replaced | initial-user-account, | |
| FR 1 - IAC | New user accounts has enforced password expiration | force-password-expiration | |
| FR 1 - IAC | Configuration has been implemented to protect authenticators from unauthorized disclosure | encrypt-secrets | |
| FR 1 - IAC | Configuration has been implemented to enforce password strength | enforce-usage-of-strong-passwords | |
| FR 1 - IAC | Self Signed certificates has been replaced. Certificate based services has a valid certificate. | public-key-infrastructure, replace-self-signed-certificate-for-web | |
| FR 1 - IAC | Revocation check is enabled | public-key-infrastructure, | |
| FR 1 - IAC | Configuration is implemented to enforce a limit on the number of consecutive invalid access attempts. | lockout-users-with-successive-failed-login | |
| FR 1 - IAC | Fail‑delay mechanisms are implemented to slow down repeated invalid attempts. | fail-delays | |
| FR 1 - IAC | Pre-login system use notification banners has been implemented | notification-concent-banners | |
| FR 2 - UC | The configured user role matches the responsibilities in accordance with principle of least privilege, and has been considered for each user | apply-principle-of-least-privilege | |
| FR 2 - UC | Configuration has been implemented to terminate sessions after a time period of inactivity | set-an-acceptable-session-timeout | |
| FR 2 - UC | Selected audit logging categories are enabled | accounting | |
| FR 2 - UC | External media and/or centralized remote logging is configured for archivation of auditable events | centralized-remote-logging | |
| FR 2 - UC | Synchronized system wide time source has been configured | time-management | |
| FR 3 - SI, FR 4 - DC | Secure variants of protocols, which include communication integrity and authentication has been implemented where it is applicable | monitoring-via-snmp, disable-unused-protocols-and-services, remote-authentication, centralized-remote-logging, vpn-and-tunnels | |
| FR 5 - DC | Network segmentation has been considered and implemented which is reflected in VLAN, firewall and VPN configuration | apply-rules-to-packet-flows, vpn-and-tunnels | |
| FR 5 - DC, FR 7 - RA | Firewall is enabled and firewall rules has been configured to block unwanted traffic | apply-rules-to-packet-flows | |
| FR 6 - DC | Auditors have been configured with role to support read-only of audit records | apply-principle-of-least-privilege, centralized-remote-logging | |
| FR 6 - DC, FR 7 - RA | Configuration has been implemented to enable the device to continuously be monitored | monitoring-via-snmp, port-monitoring | |
| FR 7 - RA | Watchdog is enabled | recovery-from-unresponsive-system | |
| FR 7 - RA | Configuration has been implemented to limit the remote management sessions | limit-remote-management-sessions | |
| FR 7 - RA | Broadcast, Multicast and Unknown Unicast is limited where feasible | limit-broadcast-multicast-and-unknown-unicast-traffic | |
| FR 7 - RA | Unused services, ports and users has been disabled | disable-unused-protocols-and-services, disable-unused-physical-ports |
Integration considerations
Restriction of communication
WeOS firewall has capabilities to block IP and defined services individually. For ease-of-use and more granular restriction, consider DNS-blocking, email blocking and other application blocking communications to be handled on a system level.
Protection from unauthorized device access
Consider implementing Port Network Access Control to add protection against unauthorized devices accessing the internal network.
WeOS