2023-TeleTrusT IEC 62443-4-2 Use Case Industrial Remote Access Device
2023-TeleTrusT IEC 62443-4-2 Use Case Industrial Remote Access Device
2023
Danksagung
TeleTrusT bedankt sich bei den nachstehenden Personen für ihre Mitwirkung an dieser Handreichung.
Projektleitung
Dieses Dokument dient als Anhaltspunkt und bietet einen Überblick. Er erhebt weder Anspruch auf Vollstän-
digkeit noch auf die exakte Auslegung der bestehenden Rechtsvorschriften. Er darf nicht das Studium der
relevanten Richtlinien, Gesetze und Verordnungen ersetzen. Desweiteren sind die Besonderheiten der jewei-
ligen Produkte sowie deren unterschiedliche Einsatzmöglichkeiten zu berücksichtigen. Insofern sind bei den
im Dokument angesprochenen Beurteilungen und Vorgehensweisen eine Vielzahl weiterer Konstellationen
denkbar.
Impressum
Herausgeber:
© 2023 TeleTrusT
V 2023-02-EN
Table of Contents
1 Scope 2
1.1 General Introduction 2
1.2 Intended Operational Environment 3
1.3 Introduction of Use case Security-Level Capability 4
1.4 Disclaimers 4
2 System Architecture 5
2.1 Architecture 5
2.2 Operational Modes/Lifecycle Phases 7
3 Component Definition 8
3.1 Component Scope Definition 8
3.2 Component Type 8
3.3 Component Security Assumptions 8
3.4 Component Threats 9
4 Security Requirements 10
4.1 Definition of Use case Security-Level Capability 10
4.2 Mapping of Component Requirements to Use case Security-Levels Capability 10
4.2.1 Rationale for Non-Selected Component Requirements 12
4.2.2 Rationale for Modified Component Requirements 14
4.3 Additional Requirements 14
5 Evaluation Specification 15
5.1 Required Test Environment 15
5.2 Required Test Interfaces 16
5.3 Acceptance Criteria 16
5.3.1 Acceptance Criteria for IEC 62443 4-2 Component Requirements 16
5.3.2 Acceptance Criteria for Additional Requirements 17
5.4 Test Case Considerations 17
5.4.1 VPN 17
5.4.2 Encryption 17
5.4.3 Authentication for remote access and for configuration management 17
5.4.4 Role-based-access for configuration 17
5.4.5 Remote Update capability 18
5.4.6 Integrity of protected firmware and boot-process 18
5.4.7 Security hardening, e.g. disabled interfaces, functions, or configuration interfaces 18
6 List of Abbreviations 18
7 Definitions 19
8 Bibliography 19
1
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
1 Scope
A use case describes a component starting from its intended use and ending up with the acceptance
criteria. Although the information presented here may be found in other documents, the added value is
represented by the perspective from which the component is described. The result may be a mapping
of the IEC 62443-4-2 Component Requirements (CRs) and / or the definition and reasoning of new
requirements.
The Use case Industrial Remote Access Device defines the widely-used automation or IACS
component-type Industrial Remote Access Device as part of an infrastructure to remotely access an OT
network.
The main aspect defined in the use case is the intended use of the component specified in the system
context. The component is introduced and specified based on system architectural and functional
aspects.
The component includes the scope, product type (according to IEC 62443-4-2), assumptions, threats,
and security functionalities. The security requirements are selected based on CRs (component
requirements from IEC 62443-4-2) and if required by the use case complemented by additional
requirements. Additionally, the use case includes an evaluation specification for the component.
There are different motivations to define use cases for automation components based on IEC 62443-4-
2. One of the most relevant aspects is the drawback of the pre-defined set of four security levels. Those
levels, called SL-1 to SL-4, are not specific enough to be easily understood and applicable by different
types of users. In this context it is important to realise that there is a wide field of users with different
background and experience of the standard or similar concepts.
Especially SL-1 is not accepted by a wide range of users because this security level does not address
lowest resistance against attackers.
Another aspect is the non-expandability of the IEC 62443-4-2 component requirements (CRs). The static
catalogue of the CRs does not allow for selecting additional component requirements. Additional
requirements are introduced in the use case concept.
2
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
The term OT network is equivalent to shop-floor network, production network, machine network,
automation network, or industrial ethernet.
Many of the machines and production lines used in industrial manufacturing are now connected and use
remote access functionality over a public network.
The target systems (Cell) are typically connected to the internet via routers (Red Box) to allow remote
maintenance. These connections are used to establish a VPN connection to what is called an
<RENDEZVOUS SERVER". This intermediate point is the link between the target system and the remote
user/workstation which has likewise established a VPN connection to the RENDEZVOUS SERVER.
Since both locations have their own connection each participant is able to terminate it at any time. The
task of the RENDEZVOUS SERVER in this process is to allow only approved remote users to connect
to the approved target system via a REMOTE WORKSTATION. (Quelle: TeleTrusT-Stand der Technik,
Fernwartung)
3
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
In this use case, the levels Basic and Extended are defined as Use case Security-Level Capabilities. In
the following table we summarise the risk and impact for the two levels.
The typical scenario for level Basic is the protected cell of a machine or equipment in production
environment and it is not used in a critical infrastructure purpose. For level Basic, no safety component
like Safety Guard System or Safety-PLC is connected to OCTL (OT-Communication-Layer).
The level Extended is defined for critical infrastructure and/or for safety-relevant scenarios. This level
might also be relevant for operators with high-cost or high-risk scenarios. The Extended level is defined
for scenarios where safety systems are protected by the firewall or where the whole application is part
of a critical infrastructure purpose. In addition, the extended scenario should be used depending on the
amount of damage to be expected from an event. Examples of such damages are a danger to life and
limb, environmental damage, the loss of intellectual property, the loss of major investments, or the loss
of reputation.
Definition of safety-relevant:
If a safety component is connected through OCTL to some cell component, then it is
safety-relevant.
1.4 Disclaimers
The IEC 62443 series defines the concept of system and components. System requirements are the
security requirements for the whole system (or for one zone of the system). These (technical) system
requirements are mapped to component requirements.
Compensating Countermeasures
There might be scenarios where components are not able to fulfil necessary component requirements.
For example, in those scenarios a set of security requirements (see Chapter 4) for the component might
be required. If a dedicated component does not have the capability to implement all requirements during
the implementation, then additional compensating countermeasures have to be defined. Those
countermeasures are not part of the component itself. Therefore, these are not part of the use case
definition in this document.
In a second situation, if some necessary security requirement is not mapped to the component defined
in the use case but has to be implemented in the environment of the component, then such an additional
requirement is defined as part of the system architecture and not as compensating countermeasure.
One example could be a logging service for a network component which is in general not capable of
implementing such a service by itself. In this case the requirement for the environment can be part of
the use case.
4
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
2 System Architecture
2.1 Architecture
In an OT environment, a cell consists of IACS components like PLC, HMI, IPC, or motion controller.
These components are connected inside a machine network (cell network). The Industrial REMOTE
ACCESS DEVICE (red box) is also part of the cell network. For remote access the device should be
able to route traffic from the VPN into the cell network. The Industrial Remote Access should also be
used as a cell network firewall, see Figure 3.
Figure 2 – Cell network with Industrial Remote Access Devices in Firewall Mode
To access the Industrial REMOTE ACCESS DEVICE a PC with an integrated VPN Client should be
used. The REMOTE WORKSTATION connects over the internet to the RENDEZVOUS SERVER where
a User and Rights management allows to connect to the Industrial REMOTE ACCESS DEVICE and/or
the cell network, see Figure 4.
In these environments, the following communication protocols and layers are used typically:
• TCP
• IP network/port
• IPSec
• UDP
• DNS
• TLS
• HTTPS
5
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
For this use case we consider the following items to be out of scope:
• fieldbuses, like EtherNet/IP or PROFINET;
• connectivity to or from other IT/OT networks
All those components together give a realistic picture on the design of today’s remote access
networks, see Figure 5.
The main remote access scenario is the so-called RENDEZVOUS SERVER scenario. In this scenario
the connections are only outgoing connections from the REMOTE ACCESS DEVICE and the REMOTE
WORKSTATION via WAN to the RENDEZVOUS SERVER. In this scenario TCP/IP, DNS and VPN
protocols will be used.
1. In this scenario the initial connection will be started from the REMOTE ACCESS DEVICE
with a (external) trigger for activating the connection to the RENDEZVOUS SERVER. This
trigger can be physical (e.g. key-switch) as well as over an API on the REMOTE ACCESS
DEVICE
2. For remote access, the same procedure must be done from the REMOTE
WORKSTATION. The connection will be initialised by the REMOTE WORKSTATION to
the RENDEZVOUS SERVER. The communication via VPN must be secured by state-of-
the-art security mechanism.
3. A publicly available RENDEZVOUS SERVER is needed to establish a VPN tunnel from
the REMOTE ACCESS DEVICE and REMOTE WORKSTATION.
6
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
4. The RENDEZVOUS SERVER now can connect the two VPN tunnels, one from the Remote
Access Device and one from the REMOTE WORKSTATION to the RENDEZVOUS
SERVER, so that the Remote Workstation has access to the REMOTE ACCESS DEVICE
which can route the traffic from the VPN tunnel into the cell network for remote access.
In this use case we consider two types of cells. The first is called Single Cell. Such a cell is not part of
an integrated production line. Those cells are either independent or stand-alone.
The second type of cell is called Multiple Cells. Those cells are part of a production line, which means
every cell is communicating with each other.
The main differences of the two cell types are in the design or planning phase. It is obvious that a
production line needs planning in advance and therefore the network and communication structure has
to be defined before the roll-out or commissioning phase.
Setup configuration
In operation Patching
Monitoring
Re-configuration
Factory reset
7
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
3 Component Definition
To ensure the reliable functionality described in the previous chapter, the Industrial REMOTE ACCESS
DEVICE also has to provide a set of security functionalities. The following lists the relevant security
functions:
These security functions are expressed in terms of IEC 62443-4-2:2019, i.e. component requirements
(CR), in Chapter 4.2. State of the art of security functionality and mechanism are defined in <TeleTrusT
Guideline State of the art in IT security= in the recent version 1.
The user authentication from the REMOTE WORKSTATION to the RENDEZVOUS SERVER is not part
of this Use Case <Remote Access Device=.
Additionally, Stateful Inspection and Layer 3 Firewall including application level gateway (ALG) or deep
package inspection to WAN is described in the Use Case <Industrial Firewall= and is not part of this Use
Case <Remote Access Device=.
Physical assumptions
The REMOTE ACCESS DEVICE is installed at least in a control cabinet with minimum locking capability.
High-resistance protection might be necessary but may depend on a case-by-case analysis, i.e. as a
result of a risk assessment. Additional physical access control of the component should be considered
if level Extended applies.
Additional physical assumptions might result from the component’s intended use, especially based on
environmental and electrical conditions.
Assumptions on integrators
The default factory configuration might not follow the principle of security-by-default, i.e. a deny/deny
ruleset is not the default configuration. The administrator carefully reads the guidance documents on
this aspect.
The REMOTE ACCESS DEVICE receives a valid time from an NTP server.
1 https://www.teletrust.de/en/publikationen/broschueren/state-of-the-art-in-it-security/
8
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
The component should not have any wireless interfaces (e.g. WiFi, Bluetooth). If wireless interfaces are
available, those are disabled by configuration.
The component should not have any mobile code functionality (see CR 2.4, e.g. Script-Code or
Container-Hosting). If mobile code functionality is available, this is disabled by configuration.
The private keys for authentication of the remote access infrastructure must be protected from
unauthorised access, modification, or theft with procedural and technical controls.
Key management is part of configuration management and therefore the integrator must maintain the
key infrastructure for the remote access over the complete lifecycle of the REMOTE ACCESS DEVICE.
There should be one unique (client) certificate for each REMOTE ACCESS DEVICE to authenticate at
the remote access infrastructure.
The encryption of the keys (cipher, size and art of encryption) must be state of the art.
Assumptions on supplier
The component supplier protects private keys for code signing from unauthorised access, modifications,
or theft with procedural and technical controls.
9
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
4 Security Requirements
The introduction of the Use case Security-Level Capability definition is given in Chapter 1.2. The
following shows the mapping of level Basic and Extended to the IEC 62443-4-2 security levels.
Table 1 Mapping of Use case Security-Level Capability to Default IEC 62443 Security Levels
SL-1 SL-2 SL-3
Basic x x
Extended x
The following table contains a mapping of the Component Requirements from IEC 62443-4-2 to the
defined Use case Security-Level Capability in this document.
10
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
11
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
For all CRs that are not mapped to the standard SLs as defined in IEC 62443-4-2, a rationale is given
in the following table.
12
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
Decommission is realised
CR 4.2 RE(1) Erase of shared memory (in most cases) by cutting
N/A off power. In this case the
resources
non-volatile memory is lost.
13
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
For all CRs that were modified mapped to the standard SLs as defined in IEC 62443-4-2, a rationale is
given in the following table.
CR Modification Rationale
Changed from SL-2 According to
to SL-3 Chapter
3.3, the component
NDR 2.13 Use of physical diagnostic and test is
interfaces protected at least in
a
locked control
cabinet.
The component Modifications of the
shall be protected components could
by a tamper seal. be identified by a
broken tamper seal.
Physical access to
The seal supports
the component is the secure delivery
NDR 3.11 (1) Notification of a tampering attempt restricted in this use process. Integrators
case, see Chapter can verify the seal
3.3. status after
unboxing and
before
commissioning.
The REMOTE ACCESS DEVICE use case supports security-by-default as much as possible. For
successful commissioning and user acceptance, this principle may be weakened for the factory default
configuration. If this is used, an empty ruleset has to enforce a deny/deny configuration.
Ruleset
14
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
5 Evaluation Specification
Comparable evaluation results of components are crucial for buyers of components. To support first-
party (self-assessment) and third-party (certification) evaluations, TeleTrusT published the document
<Evaluation Method for IEC 62443-4-2= in 2019-052. This document contains guidance for evaluation
teams.
The following sections list derivations of the given evaluation methodology or additional guidance for the
application.
In this document no guidance for performing penetration tests are given. These have to performed state-
of-the-art and in accordance to IEC 62443-4-1 requirements.
For verifying the fulfilment of the IEC 62443-4-2 Component Requirements no special test environment
is required. The REMOTE ACCESS DEVICE under test can be inspected with the help of two testing
workstations configured in two separate networks.
For testing the additional requirements specific for the REMOTE ACCESS DEVICE, the required
components and a possible high-level architecture for the setup are presented in Figure 3.
2 TeleTrusT stopped the maintenance of the document after the first major update in 2019-05.
Successor versions of this document will be published by the IEC in the future.
15
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
For the requirements defined in IEC 62443 (see table 4), the corresponding test cases defined in
<Appendix C (Normative) 3 Acceptance Criteria= [TeleTrusT-4-2] apply.
16
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
Communication integrity
Not accept:
• If the component is set to factory reset, then network
connects are established between interfaces, except
for one documented direction, i.e. only outbound.
The following information should be taken into consideration when designing the test cases.
5.4.1 VPN
The connection to the VPN Servers should be possible via pre-configured solutions for the evaluation
or with the help of the integrator / supplier of the remote access infrastructure which can provide such a
configuration.
After a successful connection is established a remote host (as a sample of a component in the OT
environment) in the virtual VPN network should be reachable via ping, webserver or an application
endpoint for passing the test case. The criteria which endpoint should be used can be defined with the
integrator / supplier of the remote access infrastructure and the test lab.
5.4.2 Encryption
The encryption which is used for the connection to the remote access infrastructure should be state of
the art. A connection log should be available with all important encryption parameters in the event log
and/or the audit log of the REMOTE ACCESS DEVICE.
17
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
Scenario 2:
After successful testing Scenario 1, continue testing of the implemented functionality regarding
conformity with the use case security level capabilities on a device.
Check using the device manual whether the device manufacturer provides a guideline for security
hardening and follow these instructions. Alternative follow at least these recommendations:
- Disable unused physical interfaces like Ethernet-Ports, USB-Ports or similar.
- Disable unused functions and services
- Disable not necessary configuration interfaces, e.g. only one interface like WEB-GUI or console
- Change Factory Password
6 List of Abbreviations
Abbreviation Description
CR Component Requirement
IP Internet Protocol
ICS Industrial Control System
IACS Industrial Automation and Control System
MAC Media Access Control Address
SL Security Level
OT Operational Technology
OTCL Operation-Technology-Communication-Layer
18
TeleTrusT - IEC 62443-4-2 Use Case Industrial Remote Access Device
7 Definitions
Term Definition
Component specification Instance of use case for the specific product
Use case Security-Level- Derived security levels which are specifically applicable for one
Capability defined use case. The specific use case should be mapped to
standard IEC 62443 or at least to Component Requirements (CR)
defined in IEC 62443-4-2.
8 Bibliography
[IEC62442-3-3] IEC 62443-3-3:2013, Industrial communication networks - Network and system security
- Part 3-3: System security requirements and security levels
[IEC62442-4-1] IEC 62443-4-1:2018, Security for industrial automation and control systems - Part 4-1:
Secure product development lifecycle requirements
[IEC62442-4-2] IEC 62443-4-2:2019, Security for industrial automation and control systems - Part 4-2:
Technical security requirements for IACS components
19
Bundesverband IT-Sicherheit e.V. (TeleTrusT)
Der Bundesverband IT-Sicherheit e.V. (TeleTrusT) ist ein Kompetenznetzwerk, das in- und ausländische Mit-
glieder aus Industrie, Verwaltung, Beratung und Wissenschaft sowie thematisch verwandte Partnerorganisa-
tionen umfasst. Durch die breit gefächerte Mitgliederschaft und die Partnerorganisationen verkörpert Te-
leTrusT den größten Kompetenzverbund für IT-Sicherheit in Deutschland und Europa. TeleTrusT bietet Foren
für Experten, organisiert Veranstaltungen bzw. Veranstaltungsbeteiligungen und äußert sich zu aktuellen Fra-
gen der IT-Sicherheit. TeleTrusT ist Träger der "TeleTrusT European Bridge CA" (EBCA; PKI-Vertrauensver-
bund), der Expertenzertifikate "TeleTrusT Information Security Professional" (T.I.S.P.) und "TeleTrusT Profes-
sional for Secure Software Engineering" (T.P.S.S.E.) sowie des Vertrauenszeichens "IT Security made in Ger-
many". TeleTrusT ist Mitglied des European Telecommunications Standards Institute (ETSI). Hauptsitz des
Verbandes ist Berlin.
Kontakt: