Funktionale Sicherheit IEC 61508 & IEC 62443

Safety & Security 2015
Funktionale Sicherheit IEC 61508 & IEC 62443
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 1
Safety & Security 2015
Bernard Mysliwiec
PROFIsafe trifft New York
PROFIsafe
Bernard Mysliwiec
Senior Safety Expert
Siemens AG, DF FA AS E&C-PRM3
[email protected]
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 2
Safety & Security 2015
Bernard Mysliwiec
Roosevelt Island
Picture on courtesy of Pomagalski
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 3
Safety & Security 2015
Bernard Mysliwiec
What about Functional Safety and IT Security
Both can be designated over the same term:
• Sicherheit in German
• Sécurité in French
• …
Both can have significant impacts on:
• Productivity
• Availibity of the plant or machine
• Costs
• People
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 5
Safety & Security 2015
Bernard Mysliwiec
Main differences
Safety protects people against machine or plant
• Malfunction of machine or plant
• safe reaction through limit monitoring
• Mostly dedicated to internal malfunction of systems
• high self diagnostic coverage
• Possible misuse of systems if reasonably possible
• to avoid dangerous situation during operation
Security protects machine or plant against people
• Intentional misuse of system or applicative means
• stop the CPU, incorrect behaviour of functions
• Mostly dedicated to external malfunction of systems
• diagnostic coverage generally not implemented
• Focussed on misuse of systems
• create a dangerous or not specified situation
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 6
Safety & Security 2015
Bernard Mysliwiec
Functional Safety
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 7
Safety & Security 2015
7
Bernard Mysliwiec
Target of Functional Safety
People
Plants
Earth
Automation and functional safety to protect ...
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 8
Safety & Security 2015
Bernard Mysliwiec
Typical application areas
Process:
Factory:
People, Plants, Earth
People and machinery
Batches
Low demand
Reaction time 0,1 ...1s
IEC 61511
VDI 2180
NE 97
Burners
TÜV
Production lines
High demand
Reaction time 5...150ms
IEC 62061/ISO 13849
NFPA79
IFA
Mobility
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 9
Safety & Security 2015
Bernard Mysliwiec
Example of dangerous machine
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 10
Safety & Security 2015
Bernard Mysliwiec
Risk reduction according IEC 61508
Residual risk
Acceptable risk
Equipment Under Control risk
Increasing Risk
Required risk reduction
Effective risk reduction
Covered with E/E/PE systems
Covered with other technologies
(not electrical
Mechanical, Hydraulical…)
Covered with
external means and
measures.
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 11
Safety & Security 2015
Bernard Mysliwiec
3-step method according to EN ISO 12100
START
1
Safe mechanical design
Has the risk been adequately reduced?
YES
NO
2
Technical measures
Has the risk been adequately reduced?
YES
NO
3
User information about residual risks
Has the risk been adequately reduced?
YES
NO
Renewed risk assessment
END
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 12
Safety & Security 2015
Bernard Mysliwiec
Determination of required PL acc. ISO 13849
Risk graph for determining the required
PLr for safety function (s)
PLr
P1
a
P2
P1
b
P2
c
F1
Starting point for
risk reduction
estimation
S1
F2
P1
F1
S2
P2
P1
d
P2
e
F2
1. S severity of injury
• S1 slight (normally reversible injury)
• S2 serious (normally irreversible injury or death)
2. F frequency and/or exposure to hazard
• F1 seldom-to-less-often and/or exposure time is short
• F2 frequent-to-continuous and/or exposure time is long
3. P possibility of avoiding hazard or limiting harm
• P1 possible under specific conditions
• P2 scarcely possible
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 13
Safety & Security 2015
Bernard Mysliwiec
Determination of required SIL acc. IEC 62061
pinch one's finger
Extent of damage:
Permanent, loss of fingers:
Se 3
3
5
4
3
12
door monitoring,
switch OFF XY axis
Frequency, duration >1 hour up to 1 day and
occurrence probability high,
Fr 5 and Pr 4
SIL2
Avoidance possible,
rarely:
Av 3
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 14
Safety & Security 2015
Bernard Mysliwiec
Structure of systems and Safety evaluation
Sub-system integrity
Sensor
Safety PLC
Actuator
n SIL claim limit: 2 / PL d
n SIL claim limit: 3 / PL e
n SIL claim limit: 3 / PL e
n
PFHD1 = 2*10-7 / h
n
PFHD2 = 1*10-8 / h
n
PFHD3 = 3*10-8 / h
Remark: values only as example
SIL / PL adequation
SIL CL SYS <= (SIL CL Sub-system)lowest
è SIL claim limit: 2
PL SYS <= (PL sub-system)lowest
PL d
Probability of failure
PFHD = PFHD1 + ...+ PFHDn + PTE
è PFHD = (20+1+3)*10-8 < 10-6
PTE =
Probability of Transmission Error
System reaches: SIL 2 / PL d
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 15
Safety & Security 2015
Bernard Mysliwiec
The way to a safe machine
Machine
Documentation
Safety-Plan
Safety Plan, Verificationsplan…
Riskanalysis
Risk analysis
Specific.
Specification, Manuals
Realisation
Selectt devices
Data sheets,…
Mounting
Wiring diagramms
Programm
Softwaredocumentation
Test
Test reports
Verification
Verification reports
CE
Validation
MD conform Documentation
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 16
Safety & Security 2015
Bernard Mysliwiec
The vision …
Safety
controller
(F-Host)
conventional,
Standard
controller
e.g. E-Stop
Task2: Integration
into the standard
controller
Safety
input / output
Task1: Integration of Safety Communication
DP/PA
Drives
Limit
switch
Laser
Light
scanner
curtains
Standard
input / output
Robots
Same features like with standard devices, e.g. device/module replacement at runtime
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 17
Safety & Security 2015
Bernard Mysliwiec
PROFIsafe objectives
Safety related communication to protect people
• A safety function is performed through a control system using specific safety related devices
• PROFIBUS, PROFINET, IO Link…
• Black channel principle
• Correct transmission of safety related information
• Door position, E-Stop, limited speed…
Detection of alteration of telegrams
• To avoid malfunction of machine
• Systematic and random failures approach
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 18
Safety & Security 2015
Bernard Mysliwiec
PROFIsafe in real life
Linked machines / linked plants
• Production lines
Wireles communication
• Controller ßà Controller
• Controller ßà Device (mobile panel)
Remote and / or maintenance station
• Monitoring and Engineering functions
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 19
Safety & Security 2015
Bernard Mysliwiec
PROFIsafe Islands
Example Ropeways:
Station <-> Cabine
Firewall
Production PC
with Security
Client Software
Firewall
VPN
Maintenance
Local
Service PC
with Security
Client Software
Internet
VPN
VPN
Remote
Industrial Ethernet Backbone
Security Gate
S
Security Gate
S
Security Zone
Security Zone
PROFINET IO
PROFINET IO
Commissioning
Local
PROFIBUS DP
PROFIBUS DP
Remote
Customer services
PROFIsafe Island
PROFIsafe Island
Remote
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 20
Safety & Security 2015
Bernard Mysliwiec
Safety & Security
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 23
Safety & Security 2015
23
Bernard Mysliwiec
IEC 61508 Part 1
7.4.2.3 The hazards, hazardous events and hazardous situations of the EUC and the EUC
control system shall be determined under all reasonably foreseeable circumstances (including
fault conditions, reasonably foreseeable misuse and malevolent or unauthorised action). This
shall include all relevant human factor issues, and shall give particular attention to abnormal or
infrequent modes of operation of the EUC. If the hazard analysis identifies that malevolent or
unauthorised action, constituting a security threat, as being reasonably foreseeable, then a
security threats analysis should be carried out.
•
•
•
•
•
•
NOTE 1 For reasonably foreseeable misuse see 3.1.14 of IEC 61508-4.
NOTE 2 For guidance on hazard identification including guidance on representation and analysis of human factor
issues, see reference [11] in the bibliography.
NOTE 3 For guidance on security risks analysis, see IEC 62443 series.
NOTE 4 Malevolent or unauthorised action covers security threats.
NOTE 5 The hazard and risk analysis should also consider whether the activation of a safety function due to a
demand or spurious action will give rise to a new hazard. In such a situation it may be necessary to develop a new
safety function in order to deal with this hazard.
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 24
Safety & Security 2015
Bernard Mysliwiec
New considerations
ISA and IEC standard in work IEC 62443
• Functional Security Management
• SL (Security Level)
• No security function but SL vectors
• One value in vector corresponds to one attack
• Plant specific evaluation
Principles similar to IEC 61508
• Functional Safety Management
• SIL (Safety Integrity Level)
• One safety function for one risk (harm)
• One SIL for one safety function
• Machine specific evaluation
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 25
Safety & Security 2015
Bernard Mysliwiec
Risk reduction according IEC 61508
Residual risk
Acceptable risk
Equipment Under Control risk
Increasing Risk
Required risk reduction
Effective risk reduction
Covered with E/E/PE systems
Covered with other technologies
(not electrical
Mechanical, Hydraulical…)
Covered with
external means and
measures.
Security measures
not excluded!
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 26
Safety & Security 2015
Bernard Mysliwiec
IEC TC44 Decision modified
Machine safety
Risk analysis including security threats
relevant for
safety considerations
Safety required
Safety: OEM, Machine builder
n
F-Measures including security measures
and requirements to the environment
Security
threats
Legal requirement
Machine Directive
Machine builder
PL/SIL,
* Basic security for new systems
Risk analysis only during
design phase
Transition CE Mark or FAT
Security
Risk analysis
Security required
Security: System integrator, Final user
n
Free application
ISA 99 / IEC 62443
Final user
SL
Risk analysis to be done periodically or as required
Security-Measures and if necessary
consequences for safety risk analysis
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 27
Safety & Security 2015
Bernard Mysliwiec
IEC TC44 Plenary London September 2012, confirmed Clearwater 2014
Decision
TC 44 considers that security threats identified by the machine manufacturer
related to accessible interfaces of electrical devices should be recorded in the
documentation accompanying the machine. A risk analysis of the security threats
to the machine should be taken by the user who can then take measures to avoid
them at the system level. This information should be taken into consideration by
TC 44 convenors and will be conveyed to TC 65.
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 29
Safety & Security 2015
Bernard Mysliwiec
Practical consequences:
Safety related communication to protect people
• The machine manufacturer identifies accessible interfaces of electrical devices like USB, LAN, WLAN or others interfaces.
• The machine manufacturer identifies possible type of access (data display, modification/alteration, insertion) regarding type of data (user
software, recepts,…)
• The machine manufacturer describes the results in the ‘information for use’ of the machine.
• The device manufacturer describes the security level of these interfaces (SL vector) and internal or external measures to improve the SL
(technical data, security handbook…).
• Final user decides which external measures are requested for his own plant
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 30
Safety & Security 2015
Bernard Mysliwiec
Security: Principles similar to IEC 61508
ISA and
IEC
standard
in work:
IEC
62443
• Functional Security Management
• SL (Security Level)
• No security function but SL vectors
• One value in vector corresponds to one attack
• Plant specific evaluation
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 31
Safety & Security 2015
Bernard Mysliwiec
Practical work flow
Practical work flow:
• Final user defines the target SL vector from plant specific risk analysis.
• Resulting measures are implemented from Final User or through designated OEM.
• Examples of possible measures
• Inherent secure (no sensible interfaces or no access)
• Only allowed people can access sensible interfaces (organisational measures, e.g. security guards)
• Activation of complementary security measures in devices
• Use of external protection measures
• Evaluation of achieved SL vector
• Final user has to perform this workflow cyclically
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 32
Safety & Security 2015
Bernard Mysliwiec
Security Management
Security Management Process
Industrial IT Security Services
§ Risk analysis with definition of mitigation
measures
Security Management
Products & Systems
1
§ Setting up of policies and coordination of
organizational measures
§ Coordination of technical measures
§ Regular / event-based repetition of the
risk analysis
Risk analysis
4
2
Validation &
improvement
Policies, Organizational
measures
3
Technical measures
Security Management is essential for a well thought-out security concept.
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 33
Safety & Security 2015
Bernard Mysliwiec
Security Levels
Security levels provide a qualitative approach to addressing security for a zone
SL 1
Protection against casual or coincidental violation
SL 2
Protection against intentional violation using simple means with low resources, generic skills and low
motivation
SL 3
Protection against intentional violation using sophisticated means with moderate resources, IACS specific skills
and moderate motivation
SL 4
Protection against intentional violation using sophisticated means with extended resources, IACS specific skills
and high motivation
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 34
Safety & Security 2015
Bernard Mysliwiec
Seven dimensions of the SL vector
SLs are based on the seven foundational requirements (FRs) for security
IAC
Identification and authentication control
UC
Use control
SI
System integrity
DC
Data confidentiality
RDF
Restricted data flow
TRE
Timely response to events
RA
Resource availability
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 35
Safety & Security 2015
Bernard Mysliwiec
Security Levels vectors: types
SL-C
CAPABILITY
A particular component or system is capable of being configured by an asset owner or system integrator to
protect against a given type of threat.
SL-T
TARGET
The asset owner or system integrator has determined through a risk assessment that they need to protect
this particular zone, system or component against this level of threat.
SL-A
ACHIEVED
The asset owner, system integrator, product supplier and/or any combination of these has configured the
zone, system or component to meet the particular security requirements defined for that SL.
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 36
Safety & Security 2015
Bernard Mysliwiec
IEC TC44 Decision modified
Machine safety
Risk analysis including security threats
relevant for
safety considerations
Machine Manufacturer:
Safety required
SILr / PLr
n
Related to effects: death…
F-Measures including security measures
and requirements to the environment
Security
threats
SIL/PL
Delivery to final user
SL-C
Security
Risk analysis
SL-T
Security required
Security-Measures and if necessary
consequences for safety risk analysis
CE Mark or FAT
Device Manufacturer
SL-C Vector for devices:
PLCs, DCs, PDS/SR…
n
Final User
Related to causes …
OEM
SL-A
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 37
Safety & Security 2015
Bernard Mysliwiec
A solution is a deployed control system to fulfill the protection requirements
of a plant
Plant environment
Asset owner
System integrator
specifies
Required protection level
of the plant
deploys the
control system to
Part 3-2
Zones and
Conduits
Solution
Control
Product supplier
system
as a combination of
develops
Independent of plant environment
PLCs
HMIs
PC devices
IEC 62443
ISA-99
Network
devices
Software
Part 3-3
System
requirements
Series 4
Series 4
Components
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 39
Safety & Security 2015
Bernard Mysliwiec
Asset owner
IEC 62443 / ISA-99
General
1-1
Terminology,
concepts and
Security
management
models
process of the asset owner
1-2 Master glossary of terms and
abbreviations
Profile
of ISO 27000
1-3 System security compliance
metrics process
Patch management
of the asset owner
Definitions
Metrics
Policies and procedures
System
Component
2-1 Requirements for an IACS
security management system
3-1 Security technologies for IACS
4-1 Product development
requirements
Profile of
ISO 27001 / 27002
2-3 Patch management in the IACS
environment
3-2 Security levels for zones and
conduits
Functional requirements
for the the output of the risk
4-2 Technical
security requirements
assessment
for IACS products
of the
asset owner
3-3 System security requirements
and Security levels
2-4 Requirements for IACS solution
suppliers
Requirements placed on security
organization and processes of the
plant owner and suppliers
Requirements to achieve a
secure system
Requirements to secure system
components
Functional requirements
Processes / procedures
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 40
Safety & Security 2015
Bernard Mysliwiec
System integrator
IEC 62443 / ISA-99
General
1-1 Terminology, concepts and
models
Policies and procedures
System
Component
2-1 Requirements for an IACS
security management system
3-1 Security technologies for IACS
4-1 Product development
requirements
1-2 Master glossary of terms and
Profile of
ISO 27001 / 27002
1-3 System security compliance
1-3 System security compliance
metrics
metrics
2-3 Patch management in the IACS
environment
Patch management
abbreviationsprocess
of the system integrator
Security documentation,
policies and procedures of
the system integrator
Definitions
Metrics
3-2 Security levels for zones and
conduits
Functional requirements
for the the output of the risk
4-2 Technical
security requirements
assessment
for IACS products
of the
system integrator
3-3 System security requirements
and Security levels
2-4 Requirements for IACS solution
suppliers
Requirements placed on security
organization and processes of the
plant owner and suppliers
Requirements to achieve a
secure system
Requirements to secure system
components
Functional requirements
Processes / procedures
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 41
Safety & Security 2015
Bernard Mysliwiec
Product supplier
IEC 62443 / ISA-99
General
1-1 Terminology, concepts and
models
1-2 Master glossary of terms and
abbreviationsprocess
Patch management
of the system and
component supplier
1-3 System security compliance
metrics
Security documentation,
policies and procedures of
the system and component
supplier
Definitions
Metrics
Policies and procedures
System
Component
2-1 Requirements for an IACS
security management system
3-1
Security technologies
IACS
Development
process for
of the
4-1 Product development
requirements
Profile of
ISO 27001 / 27002
2-3 Patch management in the IACS
environment
component supplier
3-2 Security levels for zones and
conduits
4-2 Technical security requirements
for IACS products
3-3 System security requirements
and Security levels
Functional requirements
placed on the
component supplier
2-4 Requirements for IACS solution
suppliers
Requirements placed on security
organization and processes of the
plant owner and suppliers
Functional requirements
placed on the
Requirements
to asupplier
secure system
system
Requirements to secure system
components
Functional requirements
Processes / procedures
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 42
Safety & Security 2015
Bernard Mysliwiec
Thank You!
Frei verwendbar © Siemens AG 2015. Alle Rechte vorbehalten.
Seite 44
Safety & Security 2015
44
Bernard Mysliwiec