ISA 99.00.01 : 2007
Current
The latest, up-to-date edition.
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 1: TERMINOLOGY, CONCEPTS, AND MODELS
Hardcopy , PDF
English
29-10-2007
Foreword
Introduction
1 Scope
2 Normative References
3 Definitions
3.1 Introduction
3.2 Terms
3.3 Abbreviations
4 The Situation
4.1 General
4.2 Current Systems
4.3 Current Trends
4.4 Potential Impact
5 Concepts
5.1 General
5.2 Security Objectives
5.3 Defense in Depth
5.4 Security Context
5.5 Threat-Risk Assessment
5.6 Security Program Maturity
5.7 Policies
5.8 Security Zones
5.9 Conduits
5.10 Security Levels
5.11 Security Level Lifecycle
6 Models
6.1 General
6.2 Reference Models
6.3 Asset Models
6.4 Reference Architecture
6.5 Zone and Conduit Model
6.6 Model Relationships
ISA-TR99.00.01-2007, Security Technologies for Industrial Automation and Control Systems, provides a comprehensive review of cybersecurity technologies and countermeasures relevant to industrial automation and control systems (IACS), covering areas such as role-based access control, password and token authentication, biometric and location-based methods and the use of smart cards. This technical report details network and host-based firewalls, virtual LANs and encryption techniques, including symmetric and public key cryptography, along with VPN implementations. It also examines management tools like log auditing, virus detection, intrusion detection systems, vulnerability scanners, forensic analysis, host configuration management and automated software deployment. Additionally, ISA-TR99.00.01 emphasizes the importance of physical security measures and personnel security practices to defend against both technical and human vulnerabilities. Throughout this document, deployment considerations, known limitations and future directions are discussed, especially in relation to the constraints and needs of industrial control environments
| DevelopmentNote |
Renumbered as ISA 62443-1-1. (12/2013)
|
| DocumentType |
Standard
|
| ISBN |
978-1-934394-42-7
|
| Pages |
102
|
| PublisherName |
International Society of Automation
|
| Status |
Current
|
| API RP 554-3 : 2008 | PROCESS CONTROL SYSTEMS - PROJECT EXECUTION AND PROCESS CONTROL SYSTEM OWNERSHIP |
| ISA 99.02.01 : 2009 | SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS SECURITY PROGRAM |
| API 554-2 : 2008 : R2016 | PROCESS CONTROL SYSTEMS - PROCESS CONTROL SYSTEM DESIGN |
| API 554-3 : 2008 : R2016 | PROCESS CONTROL SYSTEMS - PROJECT EXECUTION AND PROCESS CONTROL SYSTEM OWNERSHIP |
| API 554-2 : 2008 | PROCESS CONTROL SYSTEMS - PROCESS CONTROL SYSTEM DESIGN |
| IEC 61511-1:2016+AMD1:2017 CSV | Functional safety - Safety instrumented systems for the process industry sector - Part 1: Framework, definitions, system, hardware and application programming requirements |
| ISA 84.00.01-1 : 2004 | FUNCTIONAL SAFETY: SAFETY INSTRUMENTED SYSTEMS FOR THE PROCESS INDUSTRY SECTOR - PART 1: FRAMEWORK, DEFINITIONS, SYSTEM, HARDWARE AND SOFTWARE REQUIREMENTS |
| ISA 95.00.03 : 2005 | ENTERPRISE-CONTROL SYSTEM INTEGRATION - PART 3: ACTIVITY MODELS OF MANUFACTURING OPERATIONS MANAGEMENT |
| FIPS PUB 140-2 : 0 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
| IEC 61508-4:2010 | Functional safety of electrical/electronic/programmable electronic safety-related systems - Part 4: Definitions and abbreviations (see Functional Safety and IEC 61508) |
| IEC 61511-3:2016 | Functional safety - Safety instrumented systems for the process industry sector - Part 3: Guidance for the determination of the required safety integrity levels |
| ISA 84.00.01-3 : 2004 | FUNCTIONAL SAFETY: SAFETY INSTRUMENTED SYSTEMS FOR THE PROCESS INDUSTRY SECTOR - PART 3: GUIDANCE FOR THE DETERMINATION OF THE REQUIRED SAFETY INTEGRITY LEVELS - INFORMATIVE |
| ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
| ISA 95.00.01 : 2000 | ENTERPRISE-CONTROL SYSTEM INTEGRATION - PART 1: MODELS AND TERMINOLOGY |