ANSI ISA TR99.00.01-2007 Security Technologies for Industrial Automation and Control Systems.pdf
《ANSI ISA TR99.00.01-2007 Security Technologies for Industrial Automation and Control Systems.pdf》由会员分享,可在线阅读,更多相关《ANSI ISA TR99.00.01-2007 Security Technologies for Industrial Automation and Control Systems.pdf(102页珍藏版)》请在麦多课文档分享上搜索。
1、 ANSI TECHNICAL REPORT PREPARED BY ISA ANSI/ISA-TR99.00.01-2007 Security Technologies for Industrial Automation and Control Systems Approved 29 October 2007 ISA-TR99.00.01-2007 2 Copyright 2007 ISA. All rights reserved. ANSI/ISA-TR99.00.01-2007 Security Technologies for Industrial Automation and Con
2、trol Systems ISBN: 978-1-934394-42-7 Copyright 2007 by ISA. All rights reserved. Not for resale. Printed in the United States of America. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, rec
3、ording, or otherwise), without the prior written permission of the Publisher. 3 ISA-TR99.00.01-2007 Copyright 2007 ISA. All rights reserved. Preface This preface, as well as all footnotes and annexes, is included for information purposes and is not part of ANSI/ISA-TR99.00.01-2007. This document has
4、 been prepared as part of the service of ISA toward a goal of uniformity in the field of instrumentation. To be of real value, this document should not be static but should be subject to periodic review. Toward this end, the Society welcomes all comments and criticisms and asks that they be addresse
5、d to the Secretary, Standards and Practices Board; ISA; 67 Alexander Drive; P. O. Box 12277; Research Triangle Park, NC 27709; Telephone (919) 549-8411; Fax (919) 549-8288; Email: standardsisa.org. The ISA Standards and Practices Department is aware of the growing need for attention to the metric sy
6、stem of units in general, and the International System of Units (SI) in particular, in the preparation of instrumentation standards. The Department is further aware of the benefits to USA users of ISA standards of incorporating suitable references to the SI (and the metric system) in their business
7、and professional dealings with other countries. Toward this end, this Department will endeavor to introduce SI-acceptable metric units in all new and revised standards, recommended practices, and technical reports to the greatest extent possible. Standard for Use of the International System of Units
8、 (SI): The Modern Metric System, published by the American Society for Testing increased connectivity to computer and networked equipment and software; and enhanced external connectivity coupled with rapidly increasing incidents of network intrusion, more intelligent hackers, and malicious yet easil
9、y accessible software, all add to the risk as well. There are numerous electronic security technologies and cyber intrusion countermeasures potentially available to the IACS environment. This technical report addresses several categories of cyber security technologies and countermeasure techniques a
10、nd discusses specific types of applications within each category, the vulnerabilities addressed by each type, suggestions for their deployment, and their known strengths and weaknesses. Additionally, guidance is provided for using the various categories of security technologies and countermeasure te
11、chniques for mitigation of the above-mentioned increased risks. This technical report does not make recommendations of one cyber security technology or mitigation method over others, but provides suggestions and guidance for using the technologies and methods, as well as information to consider when
12、 developing a site or corporate cyber security policy, program and procedures for the IACS environment. The ISA99 standards development committee intends to update this technical report periodically to reflect new information, cyber security technologies, countermeasures, and cyber risk mitigation m
13、ethods. The committee cautions the reader that following the recommended guidance in this report will not necessarily ensure that optimized cyber security is attained for the readers industrial automation or control systems environment. It will, however, help to identify and address vulnerabilities,
14、 and to reduce the risk of undesired cyber intrusions that could compromise confidential information or, even worse, cause human and environmental harm, as well as disruption or failure of the industrial network or control systems and the industry and infrastructure critical assets they monitor and
15、regulate. Publication of this Registered Technical Report has been approved by the Accredited Standards Developer. This document is registered as a Technical Report series of publications according to the procedures for the Registration of Technical Reports with ANSI. This document is not an America
16、n National Standard and the material contained herein is not normative in nature. Comments on the content of this document should be sent to the Accredited Standards Developer. _ ActiveX, Microsoft, Win32, Win32s, and Windowsare registered trademarks of Microsoft Corporation. ControlNet and EtherNet
17、/IP are trademarks of ControlNet International, Inc. CIP is a trademark of ODVA. FOUNDATION Fieldbusis a registered trademark of the Fieldbus Foundation. Javais a registered trademark of Sun Microsystems, Inc. Linuxis a registered trademark of Linus Torvalds. MODBUSand MODBUS/TCPare registered trade
18、marks of Schneider Automation Inc. OPCis a registered trademark of OPC Foundation. Pretty Good Privacyand PGPare registered trademarks of PGP Corporation. PROFIBUSand PROFInetare registered trademarks of PROFIBUS User Organization. RSAis a registered trademark of RSA Security Inc. UNIXis a registere
19、d trademark of The Open Group.ISA-TR99.00.01-2007 10 Copyright 2007 ISA. All rights reserved. This page intentionally left blank. 11 ISA-TR99.00.01-2007 Copyright 2007 ISA. All rights reserved. Introduction This ISA technical report provides an evaluation and assessment of many current types of elec
20、tronic-based cyber security technologies, mitigation methods, and tools that may apply to protecting the IACS environment from detrimental cyber intrusions and attacks. For the various technologies, methods and tools introduced in this report, a discussion of their development, implementation, opera
21、tions, maintenance, engineering and other user services is provided. The report also provides guidance to manufacturers, vendors, and security practitioners at end-user companies, facilities, and industries on the technological options and countermeasures for securing automated IACSs (and their asso
22、ciated industrial networks) against electronic (cyber) attack. Following the recommended guidance in this technical report will not necessarily ensure that optimized cyber security is attained for IACSs. It will, however, help to identify and address vulnerabilities, and to reduce the risk of undesi
23、red intrusions that could compromise confidential information or cause disruption or failure of control systems and the critical infrastructure assets they automate and control. Of more concern, use of the recommendations may aid in reducing the risk of any human or environmental harm that may resul
24、t after the cyber compromise of an automated control system, or its associated industrial network. The cyber security guidance presented in this document is general in nature, and should be applied to each control system or network as appropriate by personnel knowledgeable in those specific industri
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIISATR9900012007SECURITYTECHNOLOGIESFORINDUSTRIALAUTOMATIONANDCONTROLSYSTEMSPDF

链接地址:http://www.mydoc123.com/p-437029.html