13. Introduction to Security Risk Assessment for System Design Flashcards
Define the term “Security level”
The measure of confidence that the IACS is free from vulnerabilities and functions in an intended manner.
List the 5 security levels defined in 62443
SL0
SL1
SL2
SL3
SL4
Define SL4
Protection against intentional violation using sophisticated means, with extended resources, IACS specific skills and high motivation
Define SL3
Protection against intentional violation using sophisticated means, with moderate resources, IACS specific skills and moderate motivation
Define SL2
Protection against intentional violation using simple means with low resources, generic skills and low motivation
Define SL1
Protection against casual or coincidental violation
Define SL0
No specific requirements or security protection necessary
Security levels can be broken down into 3 types. List these 3 types.
Target (SL-T)
Achieved (SL-A)
Capability (SL-C)
Define SL-T
Target security level
- Desired level of security for a particular system
- This is determined by performing a risk assessment on a system and determining that it needs a particular level of security for correct operation
Define SL-C
Capability SL
- This states that a particular component or system is capable of meeting the target SL natively, and without additional measures when properly configured and integrated
Define SL-A
Achieved SL
- actual level of security of a particular system
- measured after a system design is available or in place
- used to establish that a system meets the goals set out in the SL-T
7 Foundational requirements are defined in 62443-3-3. List them.
FR1 - Identification and Authentication Control (IAC)
FR2 - Use control (UC)
FR3 - System integrity (SI)
FR4 - Data confidentiality (DC)
FR5 - Restrict data flow (RDF)
FR6 - Timely response to events (TRE)
FR7 - Resource availability (RA)
Define FR1 - IAC
Identification and authentication control
- control access to selected devices, information, or both
- protect against unauthorized interrogation of the device or information
Define FR2 - UC
Use control
- Control use of selected devices, information, or both
- protect against unauthorized operation of the device or use of information
Define FR3 - SI
System Integrity
- Ensure the integrity of data on selected communication channels
- protect against unauthorized changes