Verification methods of selected IEC 62443-4-2 requirements
This section provides some methods how to check that the security mechanisms of the node and of the Management System are properly configured and active. Some tests are described in the tables below for manual execution. Alternatively, TTTech provides a Docker container performing some of these tests automatically. The instructions on how to use the Docker container are provided together with the container.
Mapping of tests cases to requirements
FR 1 – Identification and authentication control (IAC)
Requirement | Description | Verification MS | Verification Node |
---|---|---|---|
CR1.1 | Human user identification and authentication | Auth-1 | Auth-2 |
CR1.1. RE(1) | Unique identification and authentication | Auth-1 | Auth-2 |
CR1.2 | Software process and device identification and authentication | Auth-3 | Auth-3 |
CR1.3 | Account management | Auth-4 | Auth-4 |
CR1.4 | Identifier management | See note 1 | Delegated to the MS |
CR1.5 | Authenticator management | Auth-5 | Auth-5 |
CR1.7 | Strength of password-based authentication | Auth-6 | Delegated to the MS |
CR1.10 | Authenticator feedback | Auth-1 | Auth-2 |
CR1.11 | Unsuccessful login attempts | Auth-7 | Auth-8 |
CR1.12 | System use notification | If needed, refer to Notifications | Not implemented |
CR1.13 | Access via untrusted networks | NA | NA |
Note
Each user is identified through his email address, which guarantees the unicity.
FR2 – Use control (UC)
Requirement | Description | Verification MS | Verification Node |
---|---|---|---|
CR2.1 | Authorization enforcement | ||
CR2.1 RE(1) | Authorization enforcement for all users | ||
CR2.1 RE(2) | Permission mapping to roles | See Roles | Not implemented |
CR2.4, SAR, EDR, HDR | Mobile code | UC-1 | |
CR2.4 RE(1) SAR, EDR, HDR | Mobile code authenticity | UC-1 | |
CR2.5 | Session lock | UC-3 | UC-4 |
CR2.6 | Remote session termination | Only relevant for the node | UC-5 |
CR2.8 | Auditable events | ||
CR2.9 | Audit storage capacity | Part of hosting | |
CR2.10 | Response to audit processing failures | Part of hosting | |
CR2.11 | Timestamps | Used in Auth-1 | Used in Auth-2 |
CR2.11 RE(1) | Time synchronization | Tested in Auth-1 | Tested in Auth-2 |
CR2.12 | Non-repudiation | ||
CR2.13 EDR | Use of physical diagnostic and test interfaces | NA | Non-destructive method not available. |
FR3 – System integrity (SI)
Requirement | Description | Verification MS | Verification Node |
---|---|---|---|
CR3.1 | Communication integrity | SI-1 | SI-2 |
CR3.1 RE(1) | Communication authentication | SI-1 | |
CR3.2 EDR, HDR | Protection from malicious code | Part of hosting | Pending |
CR3.3 | Security functionality verification | This document | This document |
CR3.4 | Software and information integrity | Part of hosting | Done as part of the certified development process. |
CR3.4 RE(1) | Authenticity of software and information | Part of hosting | Done as part of the certified development process. |
CR3.5 | Input validation | Done as part of the certified development process. | Done as part of the certified development process. |
CR3.7 | Error handling | Done as part of the certified development process. | Done as part of the certified development process. |
CR3.8 | Session integrity | SI-3 | SI-4 |
CR3.9 | Protection of audit information | Part of hosting | Pending |
CR3.10 EDR, HDR | Support for updates | NA | Regular updates are published, no verification needed. |
CR3.10 RE(1) EDR, HDR | Update authenticity and integrity | NA | The checks are performed at different levels, preventing tests in a productive environment. |
CR3.11 EDR.HDR | Physical tamper resistance and detection | NA | Non-destructive method not available. |
CR3.12 EDR, HDR | Provisioning product supplier roots of trust | NA | Non-destructive method not available. |
CR3.14 | EDR, HDR Integrity of the boot process | NA | Non-destructive method not available. |
CR3.14 (1) EDR, HDR | Authenticity of the boot process | NA | Non-destructive method not available. |
All requirements applicable only to EDR and HDR devices are not relevant for the management system.
FR 4 – Data confidentiality (DC)
Requirement | Description | Verification MS | Verification Node |
---|---|---|---|
CR4.1 | Information confidentiality | Part of hosting,SI-1 | Pending |
CR4.2 | Information persistence | Part of hosting | Non-destructive method not available. |
CR4.3 | Use of cryptography | Done as part of the certified development process. | Done as part of the certified development process. |
FR 5 – Restricted data flow (RDF)
Requirement | Description | Verification MS | Verification Node |
---|---|---|---|
FR 5.1 | Network segmentation | NA | No practical test available |
FR 6 – Timely response to events (TRE)
Requirement | Description | Verification MS | Verification Node |
---|---|---|---|
CR6.1 | Audit log accessibility | See Audit-logs | See Node audit logs |
CR6.2 | Continuous monitoring | Part of hosting | See Node system monitoring |
FR 7 – Resource availability (RA)
Requirement | Description | Verification MS | Verification Node |
---|---|---|---|
CR7.1 | Denial of service protection | Pending | Pending |
CR7.1 RE(1) | Manage communication load from component | Pending | Pending |
CR7.2 | Resource management | Pending | Pending |
CR7.3 | Control system backup | Part of hosting | Pending |
CR7.3 RE(1) | Backup integrity verification | Part of hosting | Pending |
CR7.4 | Control system recovery and reconstitution | Part of hosting | Pending |
CR7.6 | Network and security configuration settings | NA | See Network |
CR7.7 | Least functionality | Part of hosting | Done as part of the certified development process. |
CR7.8 | Control system component inventory | RA-10 | RA-11 |
Verification procedures
Authentication
Id | Test steps | Expected results |
---|---|---|
Auth-1 | Try to login on the MS with a non-existing |
|
Auth-2 |
|
|
Auth-3 |
|
|
Auth-4 |
|
|
Auth-5 |
|
|
Auth-6 | On the MS, try to change the password of the current user, using a password against the configured policy. Refer to Note 3 below the table. | The password is not accepted, a message is displayed explaining the policy. |
Auth-7 |
|
|
Auth-8 |
|
|
Note 1: Currently the password policy is not configurable. The password must be at least 8 characters long, contain at least one number and a mix of lower and upper case characters.
Note 2: The test uses the default configuration. If a change has been requested to the TTTech Support team, the number of failed attempts and the duration of the waiting period must be adjusted.
Note 3: The number of failed attempts and the duration of the waiting period are currently not configurable on the node.
Authorization
Id | Test steps | Expected results |
---|---|---|
UC-1 | Go to the Management System login page |
|
UC-3 |
|
|
UC-4 |
|
|
UC-5 |
|
|
Note
Some tests may be faster if the default configuration is changed to reduce to time out.
Integrity
Id | Test steps | Expected results |
---|---|---|
SI-1 | Scan the URL of the MS with an online SSL check tool or use TTTech verification tool. |
|
SI-3 |
|
|
SI-4 |
|
|
Availability
Id | Test steps | Expected results |
---|---|---|
RA-10 |
|
The response includes the current version, the build date and the hash of the git commit. |
RA-11 |
|
The response to the first call contains the name of the device, the hardware model and the IP address of the node. The second response includes the version name, the build date and the git commit. |