New white paper on industrial cybersecurity from ISA and the ISA Global Cybersecurity Alliance

Jan. 27, 2022
The International Society of Automation (ISA) and the ISA Global Cybersecurity Alliance (ISAGCA), with contributing author Gary Rathwell, released a new white paper, “Implementing an Industrial Cybersecurity Program for Your Enterprise.”

The International Society of Automation (ISA) and the ISA Global Cybersecurity Alliance (ISAGCA), with contributing author Gary Rathwell, have released a new white paper entitled, “Implementing an Industrial Cybersecurity Program for Your Enterprise.”

ISA/IEC 62443 provides powerful tools to reduce the risk of financial, reputational, human and environmental impact from cyber attacks on Industrial Automation and Control Systems (IACS). ISA/IEC 62443 has been categorized as a “horizontal standard” by the International Electrotechnical Committee (IEC), validating its applicability for a wide range of industries. Any specific company is likely to find that while most of the standard applies to their IACS, parts of it may not. For example, some “normative requirements” that are appropriate for an interstate pipeline, may not be relevant to a chemical plant or a discrete manufacturing facility. There are also obvious differences between a large-scale corporation with many sites and thousands of employees, and a small company with a few dozen staff.

It is therefore recommended that each company establishes their own IACS Cybersecurity Program to manage cybersecurity risks, and ISA/IEC 62443 2-1 provides guidance on how to establish such a security program for IACS asset owners.

The white paper is intended to summarize the guidance from the series of standards and address the specific needs of owner/operators of industrial facilities. The paper covers the following topics: 

  1. What is an IACS cybersecurity program?
  2. Preparing an IACS cybersecurity program.
  3. How does an IACS cybersecurity program relate to IT cybersecurity?
  4. Costs and benefits of an IACS cybersecurity program.
  5. What to do next.

“Creating an IACS cybersecurity program is approachable, and companies should be working with their vendors and partners to build such a program if they don’t already have one in place,” said contributing author Gary Rathwell. “This paper gives a foundation for building a program, and there is no time to waste for companies and organizations looking for protection from, and mitigation of, cyber incidents.”

The white paper is available to download here.

In the coming months, ISAGCA plans to publish additional white papers intended to guide IACS vendors, suppliers of IACS products and services, integration/engineering services, and other stakeholders as they prepare IACS cybersecurity programs within their facilities and operations.

Sponsored Recommendations

Learn About: Micro Motion™ 4700 Config I/O Coriolis Transmitter

An Advanced Transmitter that Expands Connectivity

Micro Motion™ G-Series Compact, Drainable Coriolis Flow and Density Meters

Micro Motion G-Series Coriolis flow and density meters are ideally suited for Process Monitoring and Optimization applications, offering easy selection with pre-selected models...

Learn about: Micro Motion G-Series Coriolis Flow and Density Meters

The Micro Motion G-Series is designed to help you access the benefits of Coriolis technology even when available space is limited.

Micro Motion 4700 Coriolis Configurable Inputs and Outputs Transmitter

The Micro Motion 4700 Coriolis Transmitter offers a compact C1D1 (Zone 1) housing. Bluetooth and Smart Meter Verification are available.