Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

Webinar: Securing Operations and Building Resilience in Critical Infrastructure

The connectivity of systems and products has created a complex and interdependent ecosystem of stakeholders, including product suppliers, asset operators, asset owners and system integrators. The ISA Global Cybersecurity Alliance (ISAGCA) held a webinar on 12 December 2024 exploring the progression from "secure by design" to the concept of "secure by operations" — crucial for enhancing cybersecurity resilience in critical infrastructure. The panelists also discussed how the "secure by operations" concept aligns with the ISA/IEC 62443 series of standards, the world's leading consensus-based automation and control systems cybersecurity standards.

Product manufacturers, a government authority, an end user, a system integrator and a service provider shared their insights on the topic to offer the audience a well-rounded perspective. The speakers included:

  • James Goosby from Southern Company, Director Business Technology Planning and Executive in Residence (EIR) at McCrary Institute
  • Stephanie Johnson from U.S. Department of Energy's Office of CESER, Supply Chain Program Lead
  • Chris Sistrunk from Google (Mandiant), ICS/OT Leader
  • Tim Gale from 1898 & Co., Director Industrial Security
  • Megan Samford from Schneider Electric, VP, Chief Security Officer, National Security Agreements
  • Dee Kimata from Schneider Electric, Director Cybersecurity Thought Leadership (session moderator)

Secure by Operations

The speakers discussed the concept of "secure by operations" as outlined in the diagram below.

Secure by OperationsWhile the familiar concept of "secure by design" focuses on technology, "secure by operations" builds from that, focusing on the environment. Asset owners and operators maintain and implement security controls in a multi-technology operational landscape after deployment and patching. The term "secure by operations" may be new, but it is rooted in existing international standards, regulations, frameworks and best practices (i.e., the ISA/IEC 62443 series of standards).

Clarified roles and responsibilities are key to success when securing operations. The scale of these challenges is significant, so government regulators may also play a role in ensuring proper practices are in place within their jurisdiction.

Panel Discussion

The panelists also shared their insights on current drivers of the effort to secure operations, such as regulation and heightening threats. They discussed collaboration within the supply chain to build resilience into critical infrastructure, and shared their perspectives coming from a government authority, an asset owner, a product manufacturer, a service provider and a system integrator. Finally, they explored how ISA/IEC 62443 can be leveraged to drive secure by operations, as well as the value of a global standard like this. They shared how they rationalize ISA/IEC 62443 amongst the broad landscape of cybersecurity regulations, policies and standards.

A few speakers summarized their main takeaways from the panel.

James Goosby's Key Points

  • Spend some time understanding the operational environment you’re working in and understand actions that could lead to potential adverse impacts starting with safety and reliability.
  • Establish a practical baseline cyber/physical governance model that can be expanded over time as stakeholder awareness and adoption increases.
  • Leverage the resources that are available to you — ISA is a great place to start!

Stephanie Johnson's Key Points

Megan Samford's Key Points

  • Customers can “order” cybersecurity in their products through ISA/ IEC62443 4-1 (secure development), ISA/ IEC 62443 4-2 (product, includes security features), ISA/IEC 62443 3-3 (system, includes security features). Customers should request a minimum of Security Level 2 for comprehensive security features that are aligned with global regulation expectations over the next few years. 
  • Procurement can play one of the most vital roles in ensuring secure by design/demand on the front end of the lifecycle management.  If cyber is not specified into projects and product purchases, there’s a good chance that lower cost options lacking cybersecurity may be selected. 
  • ISA/IEC 62443 is unique in that it can successfully map to almost all global government policies and regulations, including the EU CRA, NIST Risk Management Framework, Department of Energy Cybersecurity Supply Chain Principles for Asset Owners and Suppliers, Cyber-Informed Engineering and CISA Secure by Demand for OT.

Tim Gale's Key Points

  • It’s important to have a robust OT cybersecurity program (ISA/IEC 62443-2-1) which defines the corporate requirements. This program should drive all OT cybersecurity activities.
  • Part of the OT cybersecurity program should cover new equipment procurement, clear and concise requirements and clear pass/fail criteria for each requirement. Guidance on requirements can be found in ISA/IEC 62443-3-3, 4-1 and 4-2.
  • We need to raise the awareness of all stakeholders. For example, the end user must begin by establishing their requirements prior to purchase of ICS (industrial control systems) equipment. The system integrators must be aware of — and in tune with — the requirements such that they can be proven at factory acceptance test/site acceptance test (FAT/SAT).  Site operations must be aware of their role in identifying and escalating unusual behavior in an ICS.

Chris Sistrunk's Key Points

  • When it comes to OT environments, cyber and physical security needs to be a culture (similar to safety culture), and secure by operations should be part of that culture. ISA/IEC 62443 should be a foundational reference for that culture.
  • Continuing on the safety culture/security culture theme, "safety rules are written in blood" — don't wait for a painful incident to happen before you react to improve your security and operations. You should be proactive and start with the people, technologies and tools that you already have.
  • When it comes to operations, resilience is so important. Have an OT incident response (IR) plan in place, practice that plan once a year and leverage ICS4ICS to manage the cyber incident.

More Resources

Further guidance and training on OT cybersecurity are available from the following entities:

  • ISAGCA, a collaborative forum to advance OT cybersecurity and understanding of the ISA/IEC 62443 series of standards
  • ISASecure, the world's leading conformance certification program for ISA/IEC 62443
  • ICS4ICS, a program to improve how cybersecurity incidents are managed with training, processes and exercises
Kara Phelps
Kara Phelps
Kara Phelps is the communications and public relations manager for ISA.

Related Posts

Webinar: Securing Operations and Building Resilience in Critical Infrastructure

The connectivity of systems and products has created a complex and interdependent ecosystem of stakeholde...
Kara Phelps Dec 27, 2024 7:00:00 AM

What Does the Future of Zero Trust in OT Look Like?

Zero trust principles have established themselves in the mindshare of cybersecurity practitioners worldwi...
Jacob Chapman Dec 20, 2024 7:00:00 AM

North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) and ISA/IEC 62443 Comparative Analysis

The Utilities Technology Council and Cumulys recently prepared a report in partnership with the ISA Globa...
Kara Phelps Dec 13, 2024 7:00:00 AM