Skip to content

IEC 62443-4-2 product compliance

This chapter provides a mapping between the requirements from IEC62443-4-2 and the Nerve features.

Management System

The security compliance differs between Management System hosted by TTTech and Management System self-managed by a customer. When the the Management System is self-managed additional security measures are required as described in Management System guidelines.

FR 1 – Identification and authentication control (IAC)

Requirement Description Compliance Links
CR1.1 Human user identification and authentication OK User management
Authentication
CR1.1. RE(1) Unique identification and authentication OK Adding a new user
CR1.2 Software process and device identification and authentication OK Adding a node
CR1.3 Account management OK User management
CR1.4 Identifier management OK User management
LDAP
CR1.5 Authenticator management OK User management LDAP
CR1.7 Strength of password-based authentication Partial Password policy is not yet configurable
LDAP
CR1.10 Authenticator feedback OK Feedback is only "Invalid credentials"
CR1.11 Unsuccessful login attempts OK Logging in
For configuration see options Configuration
CR1.12 System use notification OK Notifications
CR1.13 Access via untrusted networks NA Protected by firewall
Network

FR2 – Use control (UC)

Requirement Description Compliance Links
CR2.1 Authorization enforcement OK Roles
CR2.1 RE(1) Authorization enforcement for all users OK Roles
CR2.1 RE(2) Permission mapping to roles OK Roles
CR2.4, SAR, EDR, HDR Mobile code OK Javascript code
Docker-Image
CR2.4 RE(1) SAR, EDR, HDR Mobile code authenticity check OK Javascript code
Docker-Image
CR2.5 Session lock OK Logging in
CR2.6 Remote session termination Partial Remote-termination
See configuration options Configuration
CR2.8 Auditable events OK Audit-logs
CR2.9 Audit storage capacity OK Operations
CR2.10 Response to audit processing failures OK Operations
CR2.11 Timestamps OK Audit-logs
CR2.11 RE(1) Time synchronization OK Time
CR2.12 Non-repudiation OK Audit-logs
CR2.13 EDR Use of physical diagnostic and test interfaces NA Cloud based system

FR3 – System integrity (SI)

Requirement Description Compliance Link
CR3.1 Communication integrity OK The communication with the Management System occurs only over HTTPS (TLS 1.2 or TLS1.3).
Operations
CR3.1 RE(1) Communication authentication OK The communication with the management system is authenticated and encrypted.
CR3.2 SAR Protection from malicious code OK Operations
CR3.3 Security functionality verification Partial Security-verification
CR3.4 Software and information integrity Partial TTTech verifies the signature of the Docker images.
CR3.4 RE(1) Authenticity of software and information Partial The signature of the Docker images is checked at boot and during update. Update
CR3.5 Input validation OK TTTech ensures through software testing that input validation is effective.
CR3.7 Error handling OK TTTech ensures through software testing that input validation is effective and does not leak information.
CR3.8 Session integrity OK TTTech ensures through software testing that session integrity is guaranteed.
CR3.9 Protection of audit information OK The protection is ensured through enforcement of the OpenSearch permissions and by limiting access to the hosting VM.
CR3.10 EDR, HDR Support for updates NA (MS is SAR only) The Update is performed as part of hosting activities.
CR3.10 RE(1) EDR, HDR Update authenticity and integrity NA (MS is SAR only) The Update is performed as part of hosting activities.
CR3.11 EDR.HDR Physical tamper resistance and detection NA Cloud based system
CR3.12 EDR, HDR Provisioning product supplier roots of trust NA Cloud based system
CR3.14 EDR, HDR Integrity of the boot process NA Cloud based system
CR3.14 (1) EDR, HDR Authenticity of the boot process NA Cloud based system

All requirements applicable only to EDR and HDR devices are not relevant for the management system.

FR 4 – Data confidentiality (DC)

Requirement Description Compliance Link
CR4.1 Information confidentiality OK The Management System can only be accessed over HTTPS.
See Certificates, Data is protected at rest see Data at rest. Integrity of backup is guaranteed, see Backup
CR4.2 Information persistence OK See Decommissioning
CR4.3 Use of cryptography OK TTTech uses well-known cryptographic libraries.

FR 5 – Restricted data flow (RDF)

Requirement Description Compliance Link
FR 5.1 Network segmentation NA Cloud based system

FR 6 – Timely response to events (TRE)

Requirement Description Compliance Link
CR6.1 Audit log accessibility OK See Audit-logs
CR6.2 Continuous monitoring OK See Monitoring

FR 7 – Resource availability (RA)

Requirement Description Compliance Link
CR7.1 Denial of service protection OK The Management System is protected by applying rate-limit on all API endpoints
CR7.1 RE(1) Manage communication load from component OK The Management System is protected by applying bandwidth limit on all API endpoints and on MQTT communication.
CR7.2 Resource management OK See Resources
CR7.3 Control system backup OK See Backup
CR7.3 RE(1) Backup integrity verification OK See Backup
CR7.4 Control system recovery and reconstitution OK See Backup
CR7.6 Network and security configuration settings NA Not relevant to the control system.
CR7.7 Least functionality OK Only needed services are run.
CR7.8 Control system component inventory OK See endpoints nerve/update/cloud/current-version in the MS API

Nerve Node

The compliance to IEC62443-4-2 is related to Nerve as a platform.

FR 1 – Identification and authentication control

Requirement Description Compliance Links
CR1.1 Human user identification and authentication OK Node Permissions and Users
CR1.1. RE(1) Unique identification and authentication Partial SSH port not closed yet
CR1.2 Software process and device identification and authentication OK Node identification
CR1.3 Account management OK Part of Management System account management.
CR1.4 Identifier management OK Part of Management System identifier management.
CR1.5 Authenticator management OK Part of Management System authenticator management.
CR1.7 Strength of password-based authentication Partial Refer to Management System
CR1.10 Authenticator feedback OK Feedback is only "Invalid credentials"
CR1.11 Unsuccessful login attempts Partial Protection is implemented, but not configurable
CR1.12 System use notification Pending
CR1.13 Access via untrusted networks NA Protection by a firewall is recommended.
Network

FR2 – Use control

Requirement Description Compliance Links
CR2.1 Authorization enforcement OK Roles
CR2.1 RE(1) Authorization enforcement for all users OK Roles
CR2.1 RE(2) Permission mapping to roles Pending
CR2.4, SAR, EDR, HDR Mobile code Partial Javascript code
CR2.4 RE(1) SAR, EDR, HDR Mobile code authenticity check Partial Javascript code
CR2.5 Session lock OK The session is renewed on user activity.
The user was logged out due to inactivity.
CR2.6 Remote session termination Partial Remote-termination See configuration options Configuration
CR2.8 Auditable events OK Node audit Logs
CR2.9 Audit storage capacity OK Audit logs
CR2.10 Response to audit processing failures Pending
CR2.11 Timestamps OK Node audit Logs
CR2.11 RE(1) Time synchronization OK The Node can synchronize to an NTP server when configured via DHCP.
CR2.12 Non-repudiation OK Node audit Logs
CR2.13 EDR Use of physical diagnostic and test interfaces Pending

FR3 – System integrity

Requirement Description Compliance Link
CR3.1 Communication integrity Pending The communication with the Management System occurs over HTTPS (MQTT over secure websocket or plain HTTPS). The communication to the local UI occurs over a dedicated physical port or over a SSH tunnel. For information about workloads, refer to Application.
CR3.1 RE(1) Communication authentication OK The communication with the management system is authenticated and encrypted.
CR3.2 EDR HDR Protection from malicious code Pending
CR3.3 Security functionality verification Partial Security-verification
CR3.4 Software and information integrity Partial Docker ensures the integrity of the images.
CR3.4 RE(1) Authenticity of software and information Partial
CR3.5 Input validation OK TTTech ensures through software testing that input validation is effective.
CR3.7 Error handling OK Error messages do not leak information.
CR3.8 Session integrity OK TTTech ensures through software testing that session integrity is guaranteed.
CR3.9 Protection of audit information Pending
CR3.10 EDR, HDR Support for updates OK Node-update
CR3.10 RE(1) EDR, HDR Update authenticity and integrity Partial The integrity is checked by verifying the SHA-256 of the downloaded image with the reference provided by the Management System.
CR3.11 EDR.HDR Physical tamper resistance and detection Pending
CR3.12 EDR, HDR Provisioning product supplier roots of trust Pending
CR3.14 EDR, HDR Integrity of the boot process Pending
CR3.14 (1) EDR, HDR Authenticity of the boot process Pending

FR 4 – Data confidentiality

Requirement Description Compliance Link
CR4.1 Information confidentiality Pending
CR4.2 Information persistence Pending
CR4.3 Use of cryptography OK TTTech uses well-known cryptographic libraries.

FR 5 – Restricted data flow

Requirement Description Compliance Link
FR 5.1 Network segmentation OK See Network

FR 6 – Timely response to events

Requirement Description Compliance Link
CR6.1 Audit log accessibility OK See Audit-logs
CR6.2 Continuous monitoring OK See Node-Monitoring, Node-Alerting

FR 7 – Resource availability

Requirement Description Compliance Link
CR7.1 Denial of service protection OK DoS
CR7.1 RE(1) Manage communication load from component OK DoS
CR7.2 Resource management OK The critical resources on the node are protected by cgroups.
CR7.3 Control system backup OK Backup/Restore
CR7.3 RE(1) Backup integrity verification OK Backup/Restore
CR7.4 Control system recovery and reconstitution OK Backup/Restore
CR7.6 Network and security configuration settings OK See Network
CR7.7 Least functionality Pending Only needed services are run.
CR7.8 Control system component inventory OK The REST-API provides the necessary information ( /api/setup/node/info and /api/version )