Nuclear Power plants - Instrumentation and control systems - Use of formal security models for I&C security architecture design and assessment

IEC TR 63415:2023 provides an overview over the formalized modelling and designing of cybersecure architectures to apply for I&C system cybersecurity enforcement at NPPs. The plant-specific risk assessment can use the techniques covered by this TR. This document considers the complex problem of NPP I&C architecture synthesis to address particular issues:
- asset classification,
- barrier measures assignment,
- the information transfer and links conformity with security requirements.
This document provides guidance on creating a comprehensive security model applicable to NPP I&C systems that describes NPP I&C cybersecurity architecture and aids in accomplishing the main tasks of I&C system secure design, which are:
- specification of system designs with increased determinism that enhance security,
- mapping of the security requirements into the security architecture of the I&C system,
- definition of the security requirements for information exchange between components within the I&C system, operators and other systems,
- assistance in the determination of the security degree assignment with a model-based technique considering asset properties and formal grouping of the assets,
design and establishment of security zones boundaries.

General Information

Status
Published
Publication Date
29-Aug-2023
Current Stage
PPUB - Publication issued
Start Date
20-Jul-2023
Completion Date
30-Aug-2023
Ref Project
Technical report
IEC TR 63415:2023 - Nuclear Power plants - Instrumentation and control systems - Use of formal security models for I&C security architecture design and assessment Released:8/30/2023
English language
56 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


IEC TR 63415 ®
Edition 1.0 2023-08
TECHNICAL
REPORT
colour
inside
Nuclear Power plants – Instrumentation and control systems – Use of formal
security models for I&C security architecture design and assessment

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.

IEC Secretariat Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.

About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigendum or an amendment might have been published.

IEC publications search - webstore.iec.ch/advsearchform IEC Products & Services Portal - products.iec.ch
The advanced search enables to find IEC publications by a Discover our powerful search engine and read freely all the
variety of criteria (reference number, text, technical publications previews. With a subscription you will always have
committee, …). It also gives information on projects, replaced access to up to date content tailored to your needs.
and withdrawn publications.
Electropedia - www.electropedia.org
IEC Just Published - webstore.iec.ch/justpublished
The world's leading online dictionary on electrotechnology,
Stay up to date on all new IEC publications. Just Published
containing more than 22 300 terminological entries in English
details all new publications released. Available online and once
and French, with equivalent terms in 19 additional languages.
a month by email.
Also known as the International Electrotechnical Vocabulary

(IEV) online.
IEC Customer Service Centre - webstore.iec.ch/csc

If you wish to give us your feedback on this publication or need
further assistance, please contact the Customer Service
Centre: sales@iec.ch.
IEC TR 63415 ®
Edition 1.0 2023-08
TECHNICAL
REPORT
colour
inside
Nuclear Power plants – Instrumentation and control systems – Use of formal

security models for I&C security architecture design and assessment

INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
ICS 27.120.20  ISBN 978-2-8322-7340-1

– 2 – IEC TR 63415:2023 © IEC 2023
CONTENTS
FOREWORD . 5
INTRODUCTION . 7
1 Scope . 9
2 Normative references . 10
3 Terms and definitions . 10
4 Abbreviated terms . 12
5 I&C system security life cycle and security modelling activities . 13
6 Description of a typical NPP I&C system . 15
7 Security requirements and security architecture . 16
7.1 General framework . 16
7.2 Integrated security model . 18
7.3 Basics of the information exchange model (DM) . 18
7.4 Basics of the security model (SLM) . 18
7.5 Basic principles of the secure design . 19
7.6 Asset ranking and ordering . 19
7.7 Information property of the asset. 19
7.8 Security degrees concept and security architecture. 20
7.9 Establishing a relation between the data model and the security model . 21
8 Procedure of I&C security modelling . 21
8.1 General . 21
8.2 General approach to asset classification . 24
8.3 Security degree assignment and the analysis of model conformance . 24
8.4 Classification in hierarchical systems . 24
9 Case study of I&C security architecture synthesis . 26
9.1 General . 26
9.2 Definition of the security model . 26
9.3 Selecting the detail level in system analysis . 27
9.4 Asset classification . 27
9.5 Identification and initial classification of assets . 28
9.6 Data model . 28
9.7 Analysis of the model and synthesis of architecture . 29
9.8 Assessment of the modified security architecture . 33
10 NPP cybersecurity simulation for security assessment of I&C systems . 34
11 Conclusion . 35
Annex A (informative) Data model . 37
Annex B (informative) Security model definition (SLM) . 40
Annex C (informative) Justification of the secure by design principle . 41
Annex D (informative) Mapping of security and data model . 43
Annex E (informative) Formal approach to asset clustering and classification . 46
E.1 Input data types and the choice of data representation for the analysis . 46
E.2 Order relation on a security graph . 46
E.3 Data renormalization . 47
E.4 Criteria and clustering method . 47
Annex F (informative) Some algorithmic aspects for security architecture synthesis . 49
Annex G (informative) Asset classification using clustering method: an example . 50

Annex H (informative) Mathematical notations in the integrated security mode . 53
H.1 Integrated cybersecurity model, ICM . 53
H.2 Model of information exchange, DM . 53
H.3 Allowed transformation of a security graph . 53
H.4 Relationship of secure information transfer between two assets . 53
H.5 Relationship of simple information transfer between two assets . 53
H.6 Asymmetric operations between two assets . 53
H.7 Access rules model . 53
H.8 Relationship of simple information transfer between security degrees . 54
H.9 Relationship of secure information transfer between security degrees . 54
H.10 Operator R of mapping between two models . 54
Bibliography . 55

Figure 1 – Structure of a typical I&C system . 16
Figure 2 – Procedure of security architecture synthesis . 23
Figure 3 – I&C information model with subsystem hierarchy (left) and without it (right) . 25
Figure 4 – Simplified information model of security. (secure relation between degrees

are shown by dashed lines) . 27
Figure 5 – General security graph for I&C subsystem without taking into account
security controls. The borders show boundaries for workstation server and gate
subsystem. . 29
Figure 6 – Changes in the security graph for I&C subsystem when OS_WS asset is
targeting allocation to a separate zone. The edges belonging to the minimal cut are
shown with bold lines. . 30
Figure 7 – General view of the security graph for I&C subsystem, taking into account
security controls for OS assets. The security degree structure is shown in a) and the
zone structure is shown in b). Degrees and zones are shown in a solid rectangle. The
degree is numbered. . 31
Figure 8 – Changes in the security graph for I&C subsystem when server assets are
targeting allocation to a separate zone from the workstation. The edges belonging to
minimal cut are highlighted with bold line. . 32
Figure 9 – General representation of the security graph for practical I&C subsystem,
taking into account all assigned security controls for the assets. The security degree
structure is shown in a) and zone structure is shown in b). The degrees and zones are
shown in solid rectangle. The degrees are numbered. . 33
Figure 10 – General scenario of use of the digital twin for stress tests . 35
Red and orange arrows mean secure information transfer, black arrows mean
“common” information transfer. . 43
Figure D.1 – Sketch of link transformation . 43
Figure D.2 – Example of domains of connectivity in a graph – Here the graph splits
into three domains . 44
Figure G.1 – Security graph of the system in the information exchange model . 50
Figure G.2 – Transitive closure of the security graph by the relation w . 51
Figure G.3 – Asset partitioning by security degrees . 51

Table 1 – I&C life cycle stages and corresponding scenarios for the use of security
modelling . 13
Table 2 – List of assets of a typical control system channel and IS target
characteristics . 28

– 4 – IEC TR 63415:2023 © IEC 2023
Table 3 – Information security characteristics for assets in the architecture of a I&C
subsystem . 34
Table A.1 – Correspondence of the physical properties of I&C systems with the

properties of the security graph . 37
Table E.1 – NPP I&C asset properties . 46
Table F.1 – Computational methods for analyzing the security graph . 49
Table G.1 – Table of attributes . 50
Table G.2 – Partition of the assets into security degrees . 52

INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
NUCLEAR POWER PLANTS – INSTRUMENTATION AND CONTROL
SYSTEMS – USE OF FORMAL SECURITY MODELS FOR I&C SECURITY
ARCHITECTURE DESIGN AND ASSESSMENT

FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote international
co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and
in addition to other activities, IEC publishes International Standards, Technical Specifications, Technical Reports,
Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC Publication(s)”). Their
preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with
may participate in this preparatory work. International, governmental and non-governmental organizations liaising
with the IEC also participate in this preparation. IEC collaborates closely with the International Organization for
Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence between
any IEC Publication and the corresponding national or regional publication shall be clearly indicated in the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of patent
rights. IEC shall not be held responsible for identifying any or all such patent rights.
IEC TR 63415 has been prepared by subcommittee 45A: Instrumentation, control and electrical
power systems of nuclear facilities, of IEC technical committee 45: Nuclear instrumentation. It
is a Technical Report.
The text of this Technical Report is based on the following documents:
Draft Report on voting
45A/1465/DTR 45A/1476/RVDTR
Full information on the voting for its approval can be found in the report on voting indicated in
the above table.
The language used for the development of this Technical Report is English.
This document was drafted in accordance with ISO/IEC Directives, Part 2, and developed in
accordance with ISO/IEC Directives, Part 1 and ISO/IEC Directives, IEC Supplement, available
at www.iec.ch/members_experts/refdocs. The main document types developed by IEC are
described in greater detail at www.iec.ch/publications.

– 6 – IEC TR 63415:2023 © IEC 2023
The committee has decided that the contents of this document will remain unchanged until the
stability date indicated on the IEC website under webstore.iec.ch in the data related to the
specific document. At this date, the document will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
IMPORTANT – The "colour inside" logo on the cover page of this document indicates that it
contains colours which are considered to be useful for the correct understanding of its
contents. Users should therefore print this document using a colour printer.

INTRODUCTION
a) Technical background, main issues and organisation of the Standard
Over the last twenty years, Instrumentation and Control (I&C) systems for nuclear facilities
and Nuclear Power Plants (NPP) have progressed from using hard-wired, mostly analogue
components to the versatile mostly digital systems. This progression to digital systems have
enhanced design flexibility, and provides for increased acquisition of system performance
data but also introduces susceptibility to cyber-attacks for the system itself and nuclear
facility as a whole. The generally recognized solution of the I&C NPP security provision
problem is to define security requirements as early as possible during the life cycle of the
I&C system. These requirements are mapped into the appropriate system’s architecture and
security measures (controls) during the design stage. However, in practice, security controls
are often introduced only at the final stages of system development. It may lead to a
“disagreement” between system architecture and security controls that presumably make
the application of implemented measures ineffective.
On a technical view, the problem may be represented as a set of particular issues, such as
asset classification, selection, and assignment of security controls providing protective
barrier measures against cyber-attacks, arrangement of information links between assets,
etc. Current I&C NPPs security development practice addresses these issues. The work [1]
deals with assets classification issue. The technical level IEC 63096 standard [6] deals with
selection of the security controls. However, in general, the cybersecurity provision of the
I&C system is still an unresolved issue, especially at the stage of system design and
approval of functional requirements and cybersecurity measures. It is intended that this
Technical Report is used by operators of NPPs (utilities), systems evaluators and by
licensors.
b) Situation of the current Standard in the structure of the IEC SC45A standard series
IEC 63415 is a 4th level IEC/SC45A document covering the use.
For more details on the structure of the IEC SC45A standard series, see item d) of this
introduction.
c) Recommendations and limitations regarding the application of the Standard
To ensure that the document will continue to be relevant in future years, the emphasis has
been placed on issues of principle, rather than specific technologies.
d) Description of the structure of the IEC SC45A standard series and relationships with
other IEC documents and other bodies documents (IAEA, ISO)
The IEC SC 45A standard series comprises a hierarchy of four levels. The top-level
documents of the IEC SC 45A standard series are IEC 61513 and IEC 63046.
IEC 61513 provides general requirements for instrumentation and control (I&C) systems and
equipment that are used to perform functions important to safety in nuclear power plants
(NPPs). IEC 63046 provides general requirements for electrical power systems of NPPs; it
covers power supply systems including the supply systems of the I&C systems.
IEC 61513 and IEC 63046 are to be considered in conjunction and at the same level.
IEC 61513 and IEC 63046 structure the IEC SC 45A standard series and shape a complete
framework establishing general requirements for instrumentation, control and electrical
power systems for nuclear power plants.
IEC 61513 and IEC 63046 refer directly to other IEC SC 45A standards for general
requirements for specific topics, such as categorization of functions and classification of
systems, qualification, separation, defence against common cause failure, control room
design, electromagnetic compatibility, human factors engineering, cybersecurity, software
and hardware aspects for programmable digital systems, coordination of safety and security
requirements and management of ageing. The standards referenced directly at this second
level should be considered together with IEC 61513 and IEC 63046 as a consistent
document set.
___________
Numbers in square brackets refer to the Bibliography.

– 8 – IEC TR 63415:2023 © IEC 2023
At a third level, IEC SC 45A standards not directly referenced by IEC 61513 or by IEC 63046
are standards related to specific requirements for specific equipment, technical methods, or
activities. Usually these documents, which make reference to second-level documents for
general requirements, can be used on their own.
A fourth level extending the IEC SC 45 standard series, corresponds to the Technical
Reports which are not normative.
The IEC SC 45A standards series consistently implements and details the safety and
security principles and basic aspects provided in the relevant IAEA safety standards and in
the relevant documents of the IAEA nuclear security series (NSS). In particular this includes
the IAEA requirements SSR-2/1 , establishing safety requirements related to the design of
nuclear power plants (NPPs), the IAEA safety guide SSG-30 dealing with the safety
classification of structures, systems and components in NPPs, the IAEA safety guide SSG-
39 dealing with the design of instrumentation and control systems for NPPs, the IAEA safety
guide SSG-34 dealing with the design of electrical power systems for NPPs, the IAEA safety
guide SSG-51 dealing with human factors engineering in the design of NPPs and the
implementing guide NSS42-G for computer security at nuclear facilities. The safety and
security terminology and definitions used by the SC 45A standards are consistent with those
used by the IAEA.
IEC 61513 and IEC 63046 have adopted a presentation format similar to the basic safety
publication IEC 61508 with an overall life-cycle framework and a system life-cycle
framework. Regarding nuclear safety, IEC 61513 and IEC 63046 provide the interpretation
of the general requirements of IEC 61508-1, IEC 61508-2 and IEC 61508-4, for the nuclear
application sector. In this framework, IEC 60880, IEC 62138 and IEC 62566 correspond to
IEC 61508-3 for the nuclear application sector.
IEC 61513 and IEC 63046 refer to ISO 9001 as well as to IAEA GSR part 2 and IAEA GS-
G-3.1 and IAEA GS-G-3.5 for topics related to quality assurance (QA).
At level 2, regarding nuclear security, IEC 62645 is the entry document for the IEC/SC 45A
security standards. It builds upon the valid high level principles and main concepts of the
generic security standards, in particular ISO/IEC 27001 and ISO/IEC 27002; it adapts them
and completes them to fit the nuclear context and coordinates with the IEC 62443 series. At
level 2, IEC 60964 is the entry document for the IEC/SC 45A control rooms standards,
IEC 63351 is the entry document for the human factors engineering standards and
IEC 62342 is the entry document for the ageing management standards.
NOTE 1 It is assumed that for the design of I&C systems in NPPs that implement conventional safety functions
(e.g. to address worker safety, asset protection, chemical hazards, process energy hazards) international or
national standards would be applied.
NOTE 2 IEC TR 64000 provides a more comprehensive description of the overall structure of the IEC SC 45A
standards series and of its relationship with other standards bodies and standards.

NUCLEAR POWER PLANTS – INSTRUMENTATION AND CONTROL
SYSTEMS – USE OF FORMAL SECURITY MODELS FOR I&C SECURITY
ARCHITECTURE DESIGN AND ASSESSMENT

1 Scope
The TR provides an overview over the formalized modelling and designing of cybersecure
architectures to apply for I&C system cybersecurity enforcement at NPPs. The plant-specific
risk assessment can use the techniques covered by this TR.
The formal security models are often used in the analysis and design of I&C security
architectures. A formal security model is a mathematical notation such as algebra and set theory
or logical expression that defines the security properties of a system and the relationships
between different components. It provides a rigorous way to reason about the security of a
system and to identify potential vulnerabilities and threats.
This document considers the complex problem of NPP I&C architecture synthesis to address
particular issues:
• asset classification,
• barrier measures assignment,
• the information transfer and links conformity with security requirements.
This document provides guidance on creating a comprehensive security model applicable to
NPP I&C systems that describes NPP I&C cybersecurity architecture and aids in accomplishing
the main tasks of I&C system secure design, which are:
• specification of system designs with increased determinism that enhance security,
• mapping of the security requirements into the security architecture of the I&C system,
• definition of the security requirements for information exchange between components within
the I&C system, operators and other systems,
• assistance in the determination of the security degree assignment with a model-based
technique considering asset properties and formal grouping of the assets,
• design and establishment of security zones boundaries.
These tasks are closely related with the I&C NPP security framework established by IEC 62645
[2] and implement the Secure by Design principle (SeBD) [3].
This document presents the following limitations. The presented methods of the security
modelling rely on the following properties of the I&C system:
a) The system is built upon the hierarchical principle, the hierarchy exists both at the level of
functional system architecture (subsystems, software and hardware components etc.) and
at the security architecture level (degrees and zones);
b) The focus is on preserving integrity, which prevails over the principle of maintaining
confidentiality.
c) The availability property and any time related behaviour are out of the scope of this
document;
d) The notion of a “secure” communication or a “secure” barrier in the document generally does
not define the exact mechanism (controls) of how the secure property is achieved. It just
assumes that an appropriate set of the security controls is implemented in situ;
e) The approach takes into account the existing nuclear safety classification scheme [7].

– 10 – IEC TR 63415:2023 © IEC 2023
In addition to a general consideration of the I&C system security, several assumptions about
properties of the I&C system have been made to facilitate the analysis, namely:
• the set of the assets is fixed and stable over a long period of time;
• peer-to-peer relations between assets are fixed and known;
• technological/functional requirements are determined.
The users of the presented methods are supposed to be familiar with basics of graph theory,
discretionary access models, and documents listed in Clause 2.
Specific software tools implementing the presented methods eases the requirements to the
users’ mathematical background.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies.
For undated references, the latest edition of the referenced document (including any
amendments) applies.
IEC 61513, Nuclear power plants – Instrumentation and control important to safety – General
requirements for systems
IEC 62645, Nuclear power plants – Instrumentation, control and electrical power systems –
Cybersecurity requirements
IEC 62859, Nuclear power plants – Instrumentation and control systems – Requirements for
coordinating safety and cybersecurity
IEC 63096, Nuclear power plants – Instrumentation, control and electrical power systems –
Security controls
NTERNATIONAL ATOMIC ENERGY AGENCY, Computer Security Techniques for Nuclear
Facilities, IAEA Nuclear Security Series No. 17-T (Rev. 1), IAEA, Vienna (2021)

3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminology databases for use in standardization at the following
addresses:
• IEC Electropedia: available at https://www.electropedia.org/
• ISO Online browsing platform: available at https://www.iso.org/obp
3.1
asset
physical or logical object owned by or under custodial duties organization, having either a
perceived or actual value for organization
[SOURCE: IEC TS 62443-1-1 2009, 3.2.6]

3.2
I&C system
system, based on electrical and/or electronic and/or programmable electronic technology,
performing I&C functions as well as service and monitoring functions related to the operation
of the system itself.
The term is used as a general term which encompasses all elements of the system such as
internal power supplies, sensors and other input devices, data highways and other
communication paths, interfaces to actuators and other output devices. The different functions
within a system may use dedicated or shared resources
Note 1 to entry: See also “I&C function”.
Note 2 to entry: Any network is either a part of an I&C system or an I&C system by itself.
[SOURCE: IEC 61513:2011, 3.29]
3.3
I&C function
function to control, operate and/or monitor a defined part of the process
[SOURCE: IEC 61513:2011, 3.28]
3.4
data model
information exchange model
model that describes access relations between assets in I&C system during their functioning
3.5
digital twin
a digital twin is a formal digital representation of some asset, process or system that captures
attributes and behaviours of that entity suitable for communication, storage, interpretation or
processing within a certain context
3.6
integrity level
property of the asset which solely depends on the connectivity property
3.7
security architecture
plan and set of principals describing the security services that a system is required to provide
to meet the needs of its users, the system elements required to implement the service and the
performance level required in the elements to deal with the threat environment
[SOURCE: IEC TS 62443-1-1:2009, 3.2.100]
Note 1 to entry: The security architecture defines the security structure of the I&C system as a system of systems,
including the main functions, degrees, zones and boundaries of each system, the interconnection or independence
of critical digital assets (CDAs), the priority of the goals of simultaneously operating in the system and the order of
interaction between the personal and the machine in the I&C system.
Note 2 to entry: In narrower context the system architecture is a partitioning of the I&C system into a number of
interconnected subsystems and components and the arrangement of system subsystems using zone approach to
comply with security requirements related to the overall security degree of the system.
3.8
security controls
means of managing security which can be administrative, technical, or management

– 12 – IEC TR 63415:2023 © IEC 2023
[SOURCE: IEC 62645:2019, 3.18, modified – “technical, physical, or administrative” replaced
by “administrative, technical, or management ]
3.9
security degrees
gradation of security protection with associated sets of requirements, assigned to a system
according to the maximum consequences of a successful cyberattack on this system in terms
of plant safety and performance
Note 1 to entry: We assume that security degrees are ordered. The order from smaller to bigger number
corresponds to the sequence from highest security to less strict security.
[SOURCE: IEC 62645:2019, 3.19]
3.10
security measure
abstract barrier that enables secure data transfer between assets
3.11
security policy
set of rules that specify or regulate how a system or an organization provides security services
to protect its assets
Note 1 to entry: the term “security policy” used in the content of the document corresponds to “I&C digital
programmable system policy” in IEC 62645 context.
Note 2 to entry: I&C programmable digital system security policy should be translated into requirements, which will
be used to derive essential properties of the security models.
Note 3 to entry: Requirements may be expressed mathematically or in a natural non-formal language.
[SOURCE: IEC TS 62443-1-1:2009, 3.2.112]
3.12
security model
security requirements model
model that defines collection of classes (degrees of cybersecurity) and relations between them,
and rules governing asset attribution to a degree
3.13
security zone
A computer security zone is a logical and/or physical grouping of digital assets that are assigned to the same
computer security level and that share common computer security requirements owing to inherent properties of the
systems or their connections to other systems (and, if necessary, additional criteria).
[SOURCE: IAEA Nuclear Security Series No. 17-T: 2021, 2.9]
3.14
security architecture synthesis
process of bringing the information exchange model into accordance with the security
requirements model
4 Abbreviated terms
CDA  Critical Digital Asset
CPS Cyber Physical System
DAC Discretionary Access Control
MAC Mandatory Access Control
DM Data Model
ICM Integrated Cybersecurity Model
I&C Instrumentation and Control
LAN Local Area Network
NPP Nuclear Power Plant
OS Operation System
SeBD Secure by Design
SLM Security Level Model
TR Technical Report
WS Workstation
5 I&C system security life cycle and security modelling activities
The overall life cycle of the I&C programmable digital security system security forms the basis
for the understanding how various components of a secure I&C system are related to each
other. Development of the I&C system commonly includes the security related activities which
are spread on life cycle stages defined by IEC 62645. The security policy ought to cover all life
cycle stages. Omission of any stage in the security policy makes it very difficult to achieve
cybersecurity in the next stages. Table 1 shows how security modelling is used on each security
life cycle stages to strengthen the security of the I&C architecture.
Table 1 – I&C life cycle stages and corresponding
scenarios for the use of security modelling
N Life cycle stage (as per Security tasks (as per Application of security
IEC 61513:2011) IEC 62645:2019) models
1. System requirements
specification
2. NA Describe system using a top- Top-down structural view of the
down approach, considering the system architecture. The
global I&C architecture mathematical models are used
to model relations between I&C
system components. See 9.6.
3. NA Security degree assignment To facilitate the security degree
assignment using mathematical
methods. See Annex E.
4. System specification System architecture The system architecture is
partitioned into a number of
interconnected subsystems and
components which are
combined to logical zones. That
arrangement complies with
security degree assigned to
subsystems.
The mathematical models are
used to model relations
between I&C subsystem and
components.
See 9.7.
– 14 – IEC TR 63415:2023 © IEC 2023
N Life cycle stage (as per Security tasks (as per Application of security
IEC 61513:2011) IEC 62645:2019) models
5. System detailed design and The design phase shall The security model:
implementation incorporate the objectives of
elaborates the possible data
the plant design as a whole and
communication paths
on the individual I&C
subsystem security degree
develops scenarios for physical
basis to address security
and logical access to I&C
controls over:
assets
physical and logical access to
identifies interfaces between
the I&C system function,
I&C system and plant devices
use of the I&C system, and
generates preliminary attack
scenarios used for risk
data communication with other
assessment.
I&C systems.
identifies logical boundaries
The designer makes a complete
inventory of all I&C systems
makes formal assignment of the
and interfaces considering all
system and subsystem to
devices used within the plant,
physical security zones.
including diagnostic,
maintenance or test devices. See 9.7,9.8
Risk assessment at the design
phase is used to identify and
implement countermeasures
required to prevent or mitigate
the consequences of attacks
against plant I&C system.
6. System integration Integration testing confirms that The effectiveness of the
the integrated security controls developed security models is
perform as required and do not verified in accordance with the
adversely affect the system’s implemented systems.
ability to perform its required
The models are used to check
functions.
that normal information paths
do not conflict with security
barriers.
See 9.8
7. System validation Testing shall verify the I&C Possible attack scenarios to
security design of the hardware I&C system assets used for
architecture, external system validation are
communication devices and generated.
configurations for unauthorized
All parts of Clause 9.
pathways and system integrity.
8. System installation At the end of the installation, The effectiveness of the
the system shall be tested in developed security models is
the operational environment to verified against the installed
verify and validate the systems.
correctness of the I&C system
The check of installation
security features and the
correctness includes usually a
incorporation into the system in
reuse of attack scenarios
accordance with the design.
identified and generated on
previous stages.
All parts of Clause 9.
N Life cycle stage (as per Security tasks (as per Application of security
IEC 61513:2011) IEC 62645:2019) models
9. Operation and maintenance During the operation and Generation of new attack
maintenance phase, the scenarios for ongoing risk
periodic security audits of assessments.
security features shall be
The security models developed
performed.
and verified on the previous life
Prior to any system modification
cycle stages is used:
or maintenance, the affected
To assess the modification
components shall be evaluated
effect on security prior to
to confirm that all protective
applying them to the I&C
feature and design elements
system
will remain functional.
to investigate security incidents
or identify vulnerabilities and
weakness and recommend
corrective actions.
All parts of Clause 9.
10. Retirement activities NA Developing the I&C system
retirement scenarios.
All parts of Clause 9.
6 Description of a typical NPP I&C system
The I&C system is a distributed computerized system, which provides the implementation of
basic information management and the NPP control functions as:
• centralized collection and data storage about equipment’s state;
• presentation of information about the plant to the operating personnel of the NPP;
• control of the NPP technological equipment.
Interaction between the I&C system and the NPP’s equipment is carried out through gateways
and controllers connected to the LAN. The structural diagram of a typical I&C system considered
in the document is presented in Figure 1.
The components of I&C systems are:
• workstations (WSs);
• servers;
• gateways and controllers or field devices;
• network equipment.
– 16 – IEC TR 63415:2023 © IEC 2023

Figure 1 – Structure of a typical I&C system
NOTE The detailed structure of the real I&C system can be more complicated. The presented typical I&C system
are simplified and omitting details as low level measurement transformers, actuators to avoid unnecessary
complication in demonstration of the approach.
The WSs are implemented on the basis of graphical capable computers and are connected to
specific server(s) via LAN. WSs connected to the same server form a single domain that is
associated with a specific function being performed or a group of controlled equipment.
The servers process and archive the information received from the gateways. A server also
implements automatic control algorithms that form operator-independent control instruction
flow.
The information about the NPP technological equipment is received from the gateways
(controllers) in the form of analogue or discrete variables characterizing the stat
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...