- Update all submodule URLs from gitea.centraal.wbd-rd.nl to gitea.wbd-rd.nl - Add settler as proper submodule in .gitmodules - Add agent skills, function anchors, decisions, and improvements - Add Docker configuration and scripts - Add manuals and third_party docs - Update .gitignore with secrets and build artifacts - Remove stale .tgz build artifact Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
6.3 KiB
OT Security Standards — IEC 62443 & NIST SP 800-82
Used by:
ot-security-integrationagent Validation: Verified against IEC 62443 series, NIST SP 800-82, Dragos, and Rockwell Automation publications
IEC 62443 Framework Overview
IEC 62443 "Industrial communication networks — IT security for networks and systems" is the primary international standard series for Industrial Automation and Control System (IACS) cybersecurity.
Standard Structure
| Part | Title | Scope |
|---|---|---|
| 62443-1-x | General | Concepts, vocabulary, use cases |
| 62443-2-x | Policies & Procedures | Security management system, patch management |
| 62443-3-x | System | System security requirements, zones & conduits |
| 62443-4-x | Component | Secure development lifecycle, component requirements |
Key Parts for EVOLV
- 62443-3-2: Security risk assessment and system design
- 62443-3-3: System security requirements and security levels
- 62443-4-2: Technical security requirements for IACS components
Zones and Conduits
Security Zone
A zone is a logical or physical grouping of assets that share common security requirements. Assets within a zone have the same security level (SL) target.
Conduit
A conduit is a logical or physical grouping of communication channels connecting two or more zones. Conduits require security controls appropriate for the traffic they carry.
EVOLV Zone Architecture (typical WWTP deployment)
Zone 0: Enterprise IT Network (SL 1-2)
↕ [Conduit: Firewall/DMZ]
Zone 1: SCADA/Historian Network (SL 2-3)
↕ [Conduit: Data diode or filtered bridge]
Zone 2: Process Control Network (SL 3)
↕ [Conduit: Managed switch with ACLs]
Zone 3: Field Device Network (SL 2-3)
- PLCs, RTUs, I/O modules
- Node-RED edge runtime (EVOLV)
- Sensors and actuators
Zone Design Rules
- A zone can contain sub-zones
- A conduit cannot contain sub-conduits
- A zone can have more than one conduit
- Every device must belong to exactly one zone
- Communication between zones must pass through a conduit
Security Levels (SL)
| Level | Protection Against | Typical Measures |
|---|---|---|
| SL 0 | No specific requirements | — |
| SL 1 | Casual or coincidental violation | Basic authentication, logging |
| SL 2 | Intentional attack with low motivation, generic skills | Role-based access, encrypted communications |
| SL 3 | Intentional attack with moderate motivation, IACS-specific skills | Strong authentication, intrusion detection, hardened systems |
| SL 4 | Intentional attack with high motivation, IACS-specific skills, extended resources | Dedicated security team, continuous monitoring, zero-trust |
SL Types
- SL-T (Target): Required security level for the zone
- SL-A (Achieved): Actual security level implemented
- SL-C (Capability): Maximum security level a component can support
NIST SP 800-82 — Guide to ICS Security
Source: NIST Special Publication 800-82 Revision 3 (2023). "Guide to Operational Technology (OT) Security"
Key Recommendations
- Develop and maintain an OT-specific security program
- Segment OT networks from IT networks (defense in depth)
- Apply least privilege access control
- Monitor OT network traffic for anomalies
- Maintain an accurate OT asset inventory
- Implement secure remote access with MFA
- Develop OT-specific incident response plans
- Regularly assess and manage OT security risks
OPC UA Security Model
Authentication
- X.509 certificates for server and client authentication
- Username/password as fallback (less secure)
- Anonymous access (should be disabled in production)
Encryption
- Security policies define algorithm suites:
None— No security (testing only)Basic128Rsa15— Deprecated, avoidBasic256— Deprecated, avoidBasic256Sha256— Minimum recommendedAes128_Sha256_RsaOaep— PreferredAes256_Sha256_RsaPss— Strongest
Message Security Modes
None— No signing or encryptionSign— Messages signed but not encryptedSignAndEncrypt— Full protection (recommended)
Modbus Security Considerations
Vulnerabilities (standard Modbus TCP)
- No authentication — any network client can read/write registers
- No encryption — all traffic is plaintext
- No integrity protection — commands can be modified in transit
- Predictable function codes — easy to craft malicious packets
Mitigations
- Network segmentation — isolate Modbus devices in dedicated VLANs
- Firewall rules — whitelist only authorized master IP addresses
- Application-layer filtering — deep packet inspection for Modbus function codes
- Monitoring — detect unusual register access patterns
- Modbus/TCP Security (TLS) — available in newer implementations (RFC 7878-based)
EVOLV-Specific Security Considerations
Node-RED Admin Endpoints
GET /<nodeName>/menu.js— Serves configuration data to editorGET /<nodeName>/configData.js— Serves runtime config to editor- Risk: Information disclosure if exposed beyond editor network
- Mitigation: Bind Node-RED to localhost or trusted network only
msg.topic Input Validation
- All
msg.topichandlers must validate topic format before processing - Prevent topic injection: reject topics containing path separators, special characters
- Validate payload types and ranges before applying to control logic
Dynamic Configuration
- Configuration loaded from files or received via MQTT
- Must validate schema, types, and value ranges before applying
- Reject configurations that would violate safety envelopes
Control Message Safety
- Validate actuator commands against physical limits before sending
- Rate-limit control output changes (prevent rapid cycling)
- Log all control actions with timestamp, source, and reason
Authoritative References
- IEC 62443 series (2018-2024). "Industrial communication networks — IT security for networks and systems"
- NIST SP 800-82 Rev 3 (2023). "Guide to Operational Technology (OT) Security"
- Dragos Inc. — "Understanding ISA/IEC 62443: A Guide for OT Security Teams" (https://www.dragos.com/blog/isa-iec-62443-concepts)
- ISA/IEC 62443-3-3 — "System Security Requirements and Security Levels"
- OPC Foundation — "OPC UA Security Model" specification
- Modbus Organization — "MODBUS/TCP Security" specification