NIST CSF to ISA/IEC 62443 Mappings
The NIST's Cybersecurity Framework v1.1 (CSF) was developed to help organizations begin, or develop, their cybersecurity programme. The table below details NIST Mappings to ISA/IEC 62443 with additional data from Ofgem. The ISA/IEC 62443 set of standards outline best practices for organisations to secure industrial automation and control systems (IACS) against cyber threats. IEC 62443-2-1 covers how to establish an effective cyber security management system (CSMS). IEC 62443-3-3 outlines specific security requirements and security levels.To see more detailed information and additional mappings, click through to individual outcomes.
CSF ID | CSF Description | 62443-2-1 | 62443-3-3 |
---|---|---|---|
DE.AE-1 | A baseline of network operations and expected data flows for users and systems is established and managed | 4.4.3.3: Establish triggers to evaluate CSMS | |
DE.AE-2 | Detected events are analyzed to understand attack targets and methods |
4.3.4.5.6: Identify and respond to incidents 4.3.4.5.7: Identify failed and successful cyber security breaches 4.3.4.5.8: Document the details of incidents |
SR 2.10: Response to audit processing failures SR 2.11: Timestamps SR 2.12: Non-repudiation SR 2.8: Auditable events SR 2.9: Audit storage capacity SR 3.9: Protection of audit information SR 6.1: Audit log accessibility SR 6.2: Continuous monitoring |
DE.AE-3 | Event data are collected and correlated from multiple sources and sensors | SR 6.1: Audit log accessibility | |
DE.AE-4 | Impact of events is determined | ||
DE.AE-5 | Incident alert thresholds are established | 4.2.3.10: Identify the reassessment frequency and triggering criteria | |
DE.CM-1 | The network is monitored to detect potential cybersecurity events | SR 6.2: Continuous monitoring | |
DE.CM-2 | The physical environment is monitored to detect potential cybersecurity events | 4.3.3.3.8: Establish procedures for monitoring and alarming | |
DE.CM-3 | Personnel activity is monitored to detect potential cybersecurity events | SR 6.2: Continuous monitoring | |
DE.CM-4 | Malicious code is detected | 4.3.4.3.8: Establish and document antivirus/malware management procedure | SR 3.2: Malicious code protection |
DE.CM-5 | Unauthorized mobile code is detected | SR 2.4: Mobile code | |
DE.CM-6 | External service provider activity is monitored to detect potential cybersecurity events | ||
DE.CM-7 | Monitoring for unauthorized personnel, connections, devices, and software is performed | ||
DE.CM-8 | Vulnerability scans are performed |
4.2.3.1: Select a risk assessment methodology 4.2.3.7: Perform a detailed vulnerability assessment |
|
DE.DP-1 | Roles and responsibilities for detection are well defined to ensure accountability | 4.4.3.1: Assign an organization to manage and implement changes to the CSMS | |
DE.DP-2 | Detection activities comply with all applicable requirements | 4.4.3.2: Evaluate the CSMS periodically | |
DE.DP-3 | Detection processes are tested | 4.4.3.2: Evaluate the CSMS periodically | SR 3.3: Security functionality verification |
DE.DP-4 | Event detection information is communicated | 4.3.4.5.9: Communicate the incident details | SR 6.1: Audit log accessibility |
DE.DP-5 | Detection processes are continuously improved | 4.4.3.4: Identify and implement corrective and preventive actions | |
ID.AM-1 | Physical devices and systems within the organization are inventoried | 4.2.3.4: Identify the industrial automation and control systems | SR 7.8: Control system component inventory |
ID.AM-2 | Software platforms and applications within the organization are inventoried | 4.2.3.4: Identify the industrial automation and control systems | SR 7.8: Control system component inventory |
ID.AM-3 | Organizational communication and data flows are mapped | 4.2.3.4: Identify the industrial automation and control systems | |
ID.AM-4 | External information systems are catalogued | ||
ID.AM-5 | Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value | 4.2.3.6: Prioritise Systems | |
ID.AM-6 | Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established | 4.3.2.3.3: Define the organisational responsibilities | |
ID.BE-1 | The organization’s role in the supply chain is identified and communicated | ||
ID.BE-2 | The organization’s place in critical infrastructure and its industry sector is identified and communicated | ||
ID.BE-3 | Priorities for organizational mission, objectives, and activities are established and communicated | 4.2.3.6: Prioritise Systems | |
ID.BE-4 | Dependencies and critical functions for delivery of critical services are established | ||
ID.BE-5 | Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations) | ||
ID.GV-1 | Organizational cybersecurity policy is established and communicated | ||
ID.GV-2 | Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners | 4.3.2.3.3: Define the organisational responsibilities | |
ID.GV-3 | Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed | 4.4.3.7: Monitor and evaluate applicable legislation relevant to cyber security | |
ID.GV-4 | Governance and risk management processes address cybersecurity risks |
4.2.3.11: Integrate physical, HSE and cyber security risk assessments 4.2.3.1: Select a risk assessment methodology 4.2.3.3: Conduct a high-level risk assessment 4.2.3.8: Identify a detailed risk assessment methodology 4.2.3.9: Conduct a detailed risk assessment 4.3.2.4.3: Provide training for support personnel 4.3.2.6.3: Maintain consistency between risk management systems |
|
ID.RA-1 | Asset vulnerabilities are identified and documented |
4.2.3.12: Conduct risk assessments throughout the lifecycle of the IACs 4.2.3.7: Perform a detailed vulnerability assessment 4.2.3.9: Conduct a detailed risk assessment |
|
ID.RA-2 | Cyber threat intelligence is received from information sharing forums and sources |
4.2.3.12: Conduct risk assessments throughout the lifecycle of the IACs 4.2.3.9: Conduct a detailed risk assessment |
|
ID.RA-3 | Threats, both internal and external, are identified and documented |
4.2.3.12: Conduct risk assessments throughout the lifecycle of the IACs 4.2.3.9: Conduct a detailed risk assessment |
|
ID.RA-4 | Potential business impacts and likelihoods are identified |
4.2.3.12: Conduct risk assessments throughout the lifecycle of the IACs 4.2.3.9: Conduct a detailed risk assessment |
|
ID.RA-5 | Threats, vulnerabilities, likelihoods, and impacts are used to determine risk | ||
ID.RA-6 | Risk responses are identified and prioritized | ||
ID.RM-1 | Risk management processes are established, managed, and agreed to by organizational stakeholders | ||
ID.RM-2 | Organizational risk tolerance is determined and clearly expressed | 4.3.2.6.5: Determine the organisations tolerance for risk | |
ID.RM-3 | The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis | ||
ID.SC-1 | Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders | ||
ID.SC-2 | Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process |
4.2.3.10: Identify the reassessment frequency and triggering criteria 4.2.3.12: Conduct risk assessments throughout the lifecycle of the IACs 4.2.3.13: Document the Risk Assessment 4.2.3.14: Maintain vulnerability assessment records 4.2.3.1: Select a risk assessment methodology 4.2.3.2: Provide risk assessment background information 4.2.3.3: Conduct a high-level risk assessment 4.2.3.4: Identify the industrial automation and control systems 4.2.3.6: Prioritise Systems 4.2.3.8: Identify a detailed risk assessment methodology 4.2.3.9: Conduct a detailed risk assessment |
|
ID.SC-3 | Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan. |
4.3.2.6.4: Define cyber security policies and procedure compliance requirements 4.3.2.6.7: Review and update the cyber security policies and procedures |
|
ID.SC-4 | Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations. | 4.3.2.6.7: Review and update the cyber security policies and procedures | SR 6.1: Audit log accessibility |
ID.SC-5 | Response and recovery planning and testing are conducted with suppliers and third-party providers |
4.3.2.5.7: Test and update the business continuity plan 4.3.4.5.11: Conduct drills |
SR 2.8: Auditable events SR 3.3: Security functionality verification SR 7.3: Control system backup SR 7.4: Control system recovery and reconstitution |
PR.AC-1 | Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes | 4.3.3.5.1: Access accounts implement authorization security policy |
SR 1.1: Human User Identification and Authentication SR 1.2: Software process and device identification and authentication SR 1.3: Account management SR 1.4: Identifier management SR 1.5: Authenticator management SR 1.7: Strength of password-based authentication SR 1.8: Public key infrastructure (PKI) certificates SR 1.9: Strength of public key authentication |
PR.AC-2 | Physical access to assets is managed and protected |
4.3.3.3.2: Establish physical security perimeters 4.3.3.3.8: Establish procedures for monitoring and alarming |
|
PR.AC-3 | Remote access is managed | 4.3.3.6.6: Develop a policy for remote login and connections |
SR 1.13: Access via untrusted networks SR 2.6: Remote session termination |
PR.AC-4 | Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties | 4.3.3.7.3: Control access to information or systems via role-based access accounts | SR 2.1: Authorization enforcement |
PR.AC-5 | Network integrity is protected (e.g., network segregation, network segmentation) |
SR 3.1: Communication integrity SR 3.8: Session integrity |
|
PR.AC-6 | Identities are proofed and bound to credentials and asserted in interactions |
4.3.3.2.2: Screen personnel initially 4.3.3.5.2: Identify individuals 4.3.3.7.2: Establish appropriate logical and physical permission methods to access IACS devices 4.3.3.7.4: Employ multiple authorization methods for critical IACS |
SR 1.1: Human User Identification and Authentication SR 1.2: Software process and device identification and authentication SR 1.4: Identifier management SR 1.5: Authenticator management SR 1.9: Strength of public key authentication SR 2.1: Authorization enforcement |
PR.AC-7 | Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks) |
4.3.3.6.1: Develop an authentication strategy 4.3.3.6.2: Authenticate all users before system use 4.3.3.6.3: Require strong authentication methods for system administration and application configuration 4.3.3.6.4: Log and review all access attempts to critical systems 4.3.3.6.5: Authenticate all remote users at the appropriate level 4.3.3.6.6: Develop a policy for remote login and connections 4.3.3.6.7: Disable access account after failed remote login attempts 4.3.3.6.8: Require re-authentication after remote system inactivity 4.3.3.6.9: Employ authentication for task-to task communication |
SR 1.10: Authenticator feedback SR 1.1: Human User Identification and Authentication SR 1.2: Software process and device identification and authentication SR 1.5: Authenticator management SR 1.7: Strength of password-based authentication SR 1.8: Public key infrastructure (PKI) certificates SR 1.9: Strength of public key authentication |
PR.AT-1 | All users are informed and trained | 4.3.2.4.2: Provide procedure and facility training | |
PR.AT-2 | Privileged users understand their roles and responsibilities |
4.3.2.4.2: Provide procedure and facility training 4.3.2.4.3: Provide training for support personnel |
|
PR.AT-3 | Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities | 4.3.2.4.2: Provide procedure and facility training | |
PR.AT-4 | Senior executives understand their roles and responsibilities | 4.3.2.4.2: Provide procedure and facility training | |
PR.AT-5 | Physical and cybersecurity personnel understand their roles and responsibilities | 4.3.2.4.2: Provide procedure and facility training | |
PR.DS-1 | Data-at-rest is protected |
SR 3.4: Software and information integrity SR 4.1: Information confidentiality |
|
PR.DS-2 | Data-in-transit is protected |
SR 3.1: Communication integrity SR 3.8: Session integrity SR 4.1: Information confidentiality SR 4.2: Information persistence |
|
PR.DS-3 | Assets are formally managed throughout removal, transfers, and disposition |
4.3.3.3.9: Establish procedures for the addition, removal, and disposal of assets 4.3.4.4.1: Develop lifecycle management processes for IACS information |
SR 4.2: Information persistence |
PR.DS-4 | Adequate capacity to ensure availability is maintained |
SR 7.1: Denial of service protection SR 7.2: Resource management |
|
PR.DS-5 | Protections against data leaks are implemented | SR 5.2: Zone boundary protection | |
PR.DS-6 | Integrity checking mechanisms are used to verify software, firmware, and information integrity |
SR 3.1: Communication integrity SR 3.3: Security functionality verification SR 3.4: Software and information integrity SR 3.8: Session integrity |
|
PR.DS-7 | The development and testing environment(s) are separate from the production environment | ||
PR.DS-8 | Integrity checking mechanisms are used to verify hardware integrity | 4.3.4.4.4: Ensure appropriate records control | |
PR.IP-1 | A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality) |
4.3.4.3.2: Develop and implement a change management system 4.3.4.3.3: Assess all the risks of changing the IACS |
SR 7.6: Network and security configuration settings |
PR.IP-10 | Response and recovery plans are tested |
4.3.2.5.7: Test and update the business continuity plan 4.3.4.5.11: Conduct drills |
SR 3.3: Security functionality verification |
PR.IP-11 | Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening) |
4.3.3.2.1: Personnel security 4.3.3.2.2: Screen personnel initially 4.3.3.2.3: Screen personnel on an ongoing basis |
|
PR.IP-12 | A vulnerability management plan is developed and implemented | ||
PR.IP-2 | A System Development Life Cycle to manage systems is implemented | 4.3.4.3.3: Assess all the risks of changing the IACS | |
PR.IP-3 | Configuration change control processes are in place |
4.3.4.3.2: Develop and implement a change management system 4.3.4.3.3: Assess all the risks of changing the IACS |
SR 7.6: Network and security configuration settings |
PR.IP-4 | Backups of information are conducted, maintained, and tested | 4.3.4.3.9: Establish backup and restoration procedure |
SR 7.3: Control system backup SR 7.4: Control system recovery and reconstitution |
PR.IP-5 | Policy and regulations regarding the physical operating environment for organizational assets are met |
4.3.3.3.1: Establish complimentary physical and cyber security policies 4.3.3.3.2: Establish physical security perimeters 4.3.3.3.3: Provide entry controls 4.3.3.3.5: Require employees to follow security procedures 4.3.3.3.6: Protect connections |
|
PR.IP-6 | Data is destroyed according to policy | 4.3.4.4.4: Ensure appropriate records control | SR 4.2: Information persistence |
PR.IP-7 | Protection processes are improved |
4.4.3.1: Assign an organization to manage and implement changes to the CSMS 4.4.3.2: Evaluate the CSMS periodically 4.4.3.3: Establish triggers to evaluate CSMS 4.4.3.4: Identify and implement corrective and preventive actions 4.4.3.5: Review risk tolerance 4.4.3.6: Monitor and evaluate industry CSMS strategies 4.4.3.7: Monitor and evaluate applicable legislation relevant to cyber security 4.4.3.8: Request and report employee feedback on security suggestions |
|
PR.IP-8 | Effectiveness of protection technologies is shared | ||
PR.IP-9 | Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed |
4.3.2.5.3: Develop and implement business continuity plans 4.3.4.5.1: Implement an incident response plan |
|
PR.MA-1 | Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools | 4.3.3.3.7: Maintain equipment assets | |
PR.MA-2 | Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access |
4.3.3.6.5: Authenticate all remote users at the appropriate level 4.3.3.6.6: Develop a policy for remote login and connections 4.3.3.6.7: Disable access account after failed remote login attempts 4.3.3.6.8: Require re-authentication after remote system inactivity |
|
PR.PT-1 | Audit/log records are determined, documented, implemented, and reviewed in accordance with policy |
4.3.3.3.9: Establish procedures for the addition, removal, and disposal of assets 4.3.3.5.8: Audit account administration 4.3.4.4.7: Audit the information and document management process 4.4.2.1: Specify the methodology of the audit process 4.4.2.2: Conduct periodic IACS audits 4.4.2.4: Establish a document audit trail |
SR 2.10: Response to audit processing failures SR 2.11: Timestamps SR 2.12: Non-repudiation SR 2.8: Auditable events SR 2.9: Audit storage capacity |
PR.PT-2 | Removable media is protected and its use restricted according to policy | SR 2.3: Use control for portable and mobile devices | |
PR.PT-3 | The principle of least functionality is incorporated by configuring systems to provide only essential capabilities |
4.3.3.5.1: Access accounts implement authorization security policy 4.3.3.5.2: Identify individuals 4.3.3.5.3: Authorize account access 4.3.3.5.4: Record access accounts 4.3.3.5.5: Suspend or remove unneeded accounts 4.3.3.5.6: Review account permissions 4.3.3.5.7: Change default passwords 4.3.3.5.8: Audit account administration 4.3.3.6.1: Develop an authentication strategy 4.3.3.6.2: Authenticate all users before system use 4.3.3.6.3: Require strong authentication methods for system administration and application configuration 4.3.3.6.4: Log and review all access attempts to critical systems 4.3.3.6.5: Authenticate all remote users at the appropriate level 4.3.3.6.6: Develop a policy for remote login and connections 4.3.3.6.7: Disable access account after failed remote login attempts 4.3.3.6.8: Require re-authentication after remote system inactivity 4.3.3.6.9: Employ authentication for task-to task communication 4.3.3.7.1: Define an authorization security policy 4.3.3.7.2: Establish appropriate logical and physical permission methods to access IACS devices 4.3.3.7.3: Control access to information or systems via role-based access accounts 4.3.3.7.4: Employ multiple authorization methods for critical IACS |
SR 1.10: Authenticator feedback SR 1.11: Unsuccessful login attempts SR 1.12: System use notification SR 1.13: Access via untrusted networks SR 1.1: Human User Identification and Authentication SR 1.2: Software process and device identification and authentication SR 1.3: Account management SR 1.4: Identifier management SR 1.5: Authenticator management SR 1.6: Wireless access management SR 1.7: Strength of password-based authentication SR 1.8: Public key infrastructure (PKI) certificates SR 1.9: Strength of public key authentication SR 2.1: Authorization enforcement SR 2.2: Wireless use control SR 2.3: Use control for portable and mobile devices SR 2.4: Mobile code SR 2.5: Session lock SR 2.6: Remote session termination SR 2.7: Concurrent session control |
PR.PT-4 | Communications and control networks are protected |
SR 3.1: Communication integrity SR 3.5: Input validation SR 3.8: Session integrity SR 4.1: Information confidentiality SR 4.3: Use of cryptography SR 5.1: Network segmentation SR 5.2: Zone boundary protection SR 5.3: General purpose person-to-person communication restrictions SR 7.1: Denial of service protection SR 7.6: Network and security configuration settings |
|
PR.PT-5 | Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations | 4.3.2.5.2: Determine the impacts and consequences to each system |
SR 7.1: Denial of service protection SR 7.2: Resource management |
RC.CO-1 | Public relations are managed | ||
RC.CO-2 | Reputation is repaired after an incident | ||
RC.CO-3 | Recovery activities are communicated to internal and external stakeholders as well as executive and management teams | ||
RC.IM-1 | Recovery plans incorporate lessons learned | 4.4.3.4: Identify and implement corrective and preventive actions | |
RC.IM-2 | Recovery strategies are updated | ||
RC.RP-1 | Recovery plan is executed during or after a cybersecurity incident | ||
RS.AN-1 | Notifications from detection systems are investigated |
4.3.4.5.6: Identify and respond to incidents 4.3.4.5.7: Identify failed and successful cyber security breaches 4.3.4.5.8: Document the details of incidents |
SR 6.1: Audit log accessibility |
RS.AN-2 | The impact of the incident is understood |
4.3.4.5.6: Identify and respond to incidents 4.3.4.5.7: Identify failed and successful cyber security breaches 4.3.4.5.8: Document the details of incidents |
|
RS.AN-3 | Forensics are performed |
SR 2.10: Response to audit processing failures SR 2.11: Timestamps SR 2.12: Non-repudiation SR 2.8: Auditable events SR 2.9: Audit storage capacity SR 3.9: Protection of audit information SR 6.1: Audit log accessibility |
|
RS.AN-4 | Incidents are categorized consistent with response plans | 4.3.4.5.6: Identify and respond to incidents | |
RS.AN-5 | Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers) | ||
RS.CO-1 | Personnel know their roles and order of operations when a response is needed |
4.3.4.5.2: Communicate the incident response plan 4.3.4.5.3: Establish a reporting procedure for unusual activities and events 4.3.4.5.4: Educate employees on reporting cyber security incidents |
|
RS.CO-2 | Incidents are reported consistent with established criteria | 4.3.4.5.5: Report cyber security incidents in a timely manner | |
RS.CO-3 | Information is shared consistent with response plans | 4.3.4.5.2: Communicate the incident response plan | |
RS.CO-4 | Coordination with stakeholders occurs consistent with response plans | 4.3.4.5.5: Report cyber security incidents in a timely manner | |
RS.CO-5 | Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness | ||
RS.IM-1 | Response plans incorporate lessons learned |
4.3.4.5.10: Address and correct issues discovered 4.4.3.4: Identify and implement corrective and preventive actions |
|
RS.IM-2 | Response strategies are updated | ||
RS.MI-1 | Incidents are contained | 4.3.4.5.6: Identify and respond to incidents |
SR 5.1: Network segmentation SR 5.2: Zone boundary protection SR 5.4: Application partitioning |
RS.MI-2 | Incidents are mitigated |
4.3.4.5.10: Address and correct issues discovered 4.3.4.5.6: Identify and respond to incidents |
|
RS.MI-3 | Newly identified vulnerabilities are mitigated or documented as accepted risks | ||
RS.RP-1 | Response plan is executed during or after an incident | 4.3.4.5.1: Implement an incident response plan |