UL SUBJECT 2900-2-2-2016 Outline of Investigation for Software Cybersecurity for Network-Connectable Products Part 2-2 Particular Requirements for Inducstrial Control Systems (Issu.pdf
《UL SUBJECT 2900-2-2-2016 Outline of Investigation for Software Cybersecurity for Network-Connectable Products Part 2-2 Particular Requirements for Inducstrial Control Systems (Issu.pdf》由会员分享,可在线阅读,更多相关《UL SUBJECT 2900-2-2-2016 Outline of Investigation for Software Cybersecurity for Network-Connectable Products Part 2-2 Particular Requirements for Inducstrial Control Systems (Issu.pdf(14页珍藏版)》请在麦多课文档分享上搜索。
1、UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULMARCH 30, 20161UL 2900-2-2Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part 2-2: Particular Requirements for IndustrialControl SystemsIssue Number: 1March
2、 30, 2016Summary of TopicsThe outline aims to provide the minimum set of requirements by whichthe security-related features of industrial control system components areevaluated at the product level and tested for known vulnerabilities whilealso establishing a minimum set of verification activities i
3、ntended toreduce the likelihood of zero-day vulnerabilities that may affect thecomponent.ULs Outlines of Investigation are copyrighted by UL. Neither a printed norelectronic copy of an Outline of Investigation should be altered in any way. All ofULs Outlines of Investigation and all copyrights, owne
4、rships, and rights regardingthose Outlines of Investigation shall remain the sole and exclusive property of UL.COPYRIGHT 2016 UNDERWRITERS LABORATORIES INC.UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULMARCH 30, 2016UL 2900-2-22No Text on Th
5、is PageUL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULCONTENTSINTRODUCTION1 Scope .42 Normative References .53 Glossary .5DOCUMENTATION OF PRODUCT, PRODUCT DESIGN AND PRODUCT USE4 Product Documentation 75 Product Design Documentation .76 Docu
6、mentation for Product Use .7RISK CONTROLS7 General 88 Access Control, User Authentication and User Authorization .89 Remote Communication .910 Cryptography 911 Product Management .10RISK MANAGEMENT12 Vendor Product Risk Management Process 11VULNERABILITIES AND EXPLOITS13 Known Vulnerability Testing
7、1114 Malware Testing 1115 Malformed Input Testing .1115.1 General .1115.2 Malformed input test I .1215.3 Malformed input test II 1216 Structured Penetration Testing .13SOFTWARE WEAKNESS ANALYSIS17 Software Weakness Analysis .1318 Static Code Analysis 1319 Static Binary and Byte Code Analysis .13MARC
8、H 30, 2016 UL 2900-2-2 3UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULINTRODUCTIONNote: This Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part2-2: Particular Requirements for Industrial Control System
9、s refers to the Outline of Investigation forSoftware Cybersecurity for Network-Connectable Products, Part 1: General Requirements, UL 2900-1.1 Scope1.1 This security evaluation outline applies to the evaluation of industrial control systems components. Itapplies to, but is not limited to, the follow
10、ing products:a) Programmable Logic Controllers (PLC);b) Distributed Control Systems (DCS);c) Process control systems;d) Data acquistion systems;e) Historians, data loggers and data storage systems;f) Control servers;g) SCADA servers;h) Remote Terminal Units (RTU);i) Intelligent Electronic Devices (I
11、ED);j) Human-Machine Interfaces (HMI);k) Input/Output (IO) servers;l) Fieldbuses;m) Networking equipment for ICS systems;n) Data radios;o) Smart sensors;p) Controllers; andq) Embedded system/controllers.1.2 This outline does not contain any requirements regarding functional testing of products unles
12、s whereexpressly specified.MARCH 30, 2016UL 2900-2-24UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL1.3 This outline also describes requirements for the product risk management process carried out by thevendor of the product, including a list
13、 of security controls that the product (or the vendor, as applicable)shall comply with unless a risk assessment done by the vendor shows that the risk of not implementingone of these security controls is acceptable.2 Normative References2.1 All references are for the current published version of the
14、 document unless stated otherwise.a) IEC 62443 (all parts), Security for Industrial Automation and Control Systemsb) NIST FIPS 140-2 (all parts), Security Requirements for Cryptographic Modulesc) NIST SP 800-82, Guide to Industrial Control Systems (ICS) Security3 Glossary3.1 AUTHENTICATION The proce
15、ss of verifying the identity of an entity.3.2 AUTHENTICITY The property that data, information or software originate from a specific entity,which may or may not have been authenticated.3.3 AUTHORIZATION The process of giving an entity permission to access or manipulate the product,or the property th
16、at an entity has such permission.3.4 BYTE CODE Instructions and/or data that are created from source code as an intermediate stepbefore generating binary code. Byte code is independent of a specific processor architecture and istypically handled by a virtual machine or interpreter.3.5 CONFIDENTIALIT
17、Y The property that data, information or software is not made available ordisclosed to unauthorized individuals, entities, or processes.3.6 DATA LOGGER/HISTORIAN An industrial control component that has a primary function ofmeasuring and recording physical and electrical parameters over a period of
18、time.3.7 EMBEDDED PRODUCT Comprises both hardware and software for the execution of a givenfunction where the hardware is not a general purpose computer running a special purpose computingsystem.3.8 EXPLOIT An input or action designed to take advantage of a weakness (or multiple weaknesses)and achie
19、ve a negative technical impact.NOTE: The existence of an exploit targeting a weakness is what makes that weakness a vulnerability.3.9 FILE A collection of data or program instructions stored as a unit with a single name.MARCH 30, 2016 UL 2900-2-2 5UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER R
20、EPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL3.10 GENERATIONAL MALFORMED INPUT TESTING A method of deriving malformed input testcases by using detailed knowledge of the syntax and semantics of the specifications of the protocol or fileformat being tested.3.11 LOCAL INTERFACE An external inte
21、rface potentially allowing access only to individuals, entitiesor systems within a very acute proximity requiring physical access to the product.NOTE: An example is a physically wired direct connection like a USB connection or RS 485 connectionwithin physical proximity.3.12 MALFORMED INPUT TESTING A
22、 black-box testing technique used to reveal softwareweaknesses and vulnerabilities in a product by triggering them with invalid or unexpected inputs on theexternal interfaces of the product.3.13 MALWARE Software designed with malicious intent to disrupt normal function, gather sensitiveinformation,
23、and/or access other connected systems.3.14 NETWORK A collection of nodes and telecommunication links, allowing connected devices,software etc. to exchange data and communicate.3.15 PERSONALLY IDENTIFIABLE INFORMATION Any information belonging to an individual that canuniquely distinguish an individu
24、al or information that can be used to derive their identity.NOTE: This can be, but is not limited to an individuals location, health records and/or financial recordsthat when used can determine the actual individuals identity.3.16 PLC/DCS CONTROLLER An embedded product used for the automation of ind
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ULSUBJECT2900222016OUTLINEOFINVESTIGATIONFORSOFTWARECYBERSECURITYFORNETWORKCONNECTABLEPRODUCTSPART22PARTICULARREQUIREMENTSFORINDUCSTRIALCONTROLSYSTEMSISSUPDF

链接地址:http://www.mydoc123.com/p-1069375.html