IEC 62443-4-2 compliance list

Introduction 

PLCnext Control AXC F 1152AXC F 2152 and AXC F 3152 from firmware version 2023.0.x LTS, the SPLC 1000 from firmware version 01.01.0000, the RFC 4072S from firmware version 2023.0 LTS and the BPC 9102S from firmware version 2023.0.4 LTS are certified according to IEC 62443-4-1 and IEC 62443-4-2 Full ML3 Process Profile. 

For more information on the certified controller, refer to the topics AXC F 1152AXC F 2152AXC F 3152 , SPLC 1000RFC 4072S and BPC 9102S.

They support an IEC 62443-4-2 SL2 feature set like described below. In addition a subset of SL3 features is already supported.

FR1 – Identification and authentication control (IAC)

No. Description Security Level Fulfillment Links
CR 1.1 Human user identification and authentication SL1 PLCnext provides that each user can be identified and authenticated by the PLCnext User Manager in the WBM
CR 1.1
RE1
Unique identification and authentication SL2 PLCnext provides that each user can be uniquely identified and authenticated by the PLCnext User Manager in the WBM
CR 1.2 Software process and device identification and authentication SL2 PLCnext provides that each non human user access can be identified and authenticated by the PLCnext User Manager in the WBM
CR 1.2
RE1
Unique identification and authentication SL3 PLCnext provides that each non human user access can be uniquely identified and authenticated by the PLCnext User Manager in the WBM. Via the Trust Store unique identification and authentication can be configured.
CR 1.3 Account management SL1 PLCnext provides that users can be managed via the User Manager in the WBM, via LDAP.
CR 1.4 Identifier management SL1 PLCnext provides that users can be managed via the User Manager in the WBM, via LDAP, or via the Linux Configuration files. 
CR 1.5 Authenticator management SL1 PLCnext provides that the initial authenticator content is defined by the PLCnext User Manager in the WBM
CR 1.7 Strength of password-based authentication SL1 PLCnext provides that each user is assigned to configurable password complexity rulesets. The rulesets can be configured according to password guidelines. 
CR 1.7
RE1  
Password generation and lifetime restrictions for human users SL3 PLCnext provides that each user is assigned to configurable password complexity rulesets. The rulesets can be configured according to password guidelines including expiration rules.
CR 1.8 Public key infrastructure certificates SL2 PLCnext provides an Identity Store and a Trust Store in the WBM.
CR 1.9 Strength of public key authentication SL2 PLCnext provides an Identity Store and a Trust Store in the WBM.
CR 1.9
RE1
Hardware security for public key-based authentication SL3 The device identity is protected via TPM. Other identities are stored on the internal SD card and need to be protected by the system environment.
CR 1.10 Authenticator feedback SL1 Each component of the PLCnext Runtime with authentication function provides the possibility to hide the feedback of authenticator information during the authentication process.
CR 1.11 Unsuccessful login attempts SL1 PLCnext defines rules how to handle authentication errors including unsuccessful login attempts. 
CR 1.12 System use notification SL1 PLCnext provides that a system usage message is displayed before authentication. The message is configurable by authorized personnel in the user authentication.
CR 1.14 Strength of symmetric key authentication SL2 Symmetric keys are used only internally for TLS and OPC UA secure communication.  

FR2 – Use control (UC)

No. Description Security Level Fulfillment Links
CR 2.1 Authorization enforcement SL1 PLCnext provides that users can be managed via the User Manager in the WBM, via LDAP, or via the Linux Configuration files. 
CR 2.1
RE1
Authorization enforcement for all users (humans, software processes and devices) SL2 PLCnext provides that users can be managed via the User Manager in the WBM, via LDAP, or via the Linux Configuration files. User are assigned to roles which have a predefined set of permissions. 
CR 2.1
RE2  
Permission mapping to roles SL2 PLCnext provides that users can be managed via the User Manager in the WBM, via LDAP, or via the Linux Configuration files. User are assigned to roles which have a predefined set of permissions. User Manager assigns roles and permissions to the session representing the user.
CR 2.5   Session lock SL1 PLCnext provides that there is an implemented time limit of 20 minutes. 
CR 2.6   Remote session termination SL2 PLCnext provides that there is an implemented default timeout of 20 minutes. The duration can be set in the WBM
CR 2.7 Concurrent session control SL3 PLCnext provides that the User Manager provides configurable total number of sessions.
CR 2.8   Auditable events SL1 PLCnext provides a security logging to log all auditable events. 
CR 2.9 Audit storage capacity SL1 PLCnext provides a security logging ensuring the audit storage capacity. 
CR 2.10   Response to audit processing failures SL1 PLCnext provides that there is an external logging system for checking and reporting local errors.
CR 2.11 Timestamps SL1 PLCnext provides that Timestamp is available and can be set via PLCnext Engineer.
CR 2.11
RE1
Time synchronization SL2 PLCnext provides that you can set the system time using the PLCnext Engineer software. 
CR 2.12   Non-repudiation SL1 PLCnext provides a security logging to log all auditable actions and events. 

FR3 – System integrity (SI)

No. Description Security Level Fulfillment Links
CR 3.1 Communication integrity SL1 PLCnext uses TLS for the communication channels (HTTPS, OPC UA, ...). TLS ensures the integrity and authenticity of the communication.
CR 3.1
RE1
Communication authentication SL2 PLCnext uses TLS for the communication channels (HTTPS, OPC UA, ...). TLS ensures the integrity and authenticity of the communication.
CR 3.3 Security functionality verification SL1 PLCnext provides various security measures and different verification interfaces that can be used to check the security settings by the system integrator or asset owner during production according to the needs of the system design. Security logging and central security logging are major interfaces that can be enhanced by additional checks. 
CR 3.4 Software and information integrity SL1 PLCnext provides integrity of data in transition by using TLS. The User Management controls the access permission to the data in rest. Physical access to the controller must be protected by a lockable cabinet. Use of external SD card is not permitted.
CR 3.4
RE1
Authenticity of software and information SL2 PLCnext provides a User Management which grants authenticity for data access.
Physical access is protect by the cabinet. External SD card is not allowed.
Only Users with valid credentials and permissions can access the device and change data.
User actions are logged and wrong access attempts to the device are logged also.
CR 3.5 Input validation SL1 PLCnext provides input validation on interfaces. 
CR 3.6   Deterministic output SL1 Deterministic outputs are configured in PLCnext Engineer using the so-called (substitution) behavior, which defines the default value for each output module in case of failure. 
CR 3.7 Error handling SL1 PLCnext does not provide any information that could be exploited by adversaries to attack the device. Special permissions are required to read error messages. Unauthenticated users do not receive critical information.
CR 3.8   Session integrity SL2 PLCnext authorization is performed by the User Manager, which creates secure sessions.
CR 3.9 Protection of audit information SL2 Only the PLCnext roles SecurityAdmin and SecurityAuditor have the permission to read security loggings. 

FR4 – Data confidentiality (DC)

No. Description Security Level Fulfillment Links
CR 4.1 Information confidentiality SL1 PLCnext provides integrity of data in transition by using TLS. The User Management controls the access permission to the data in rest. Physical access to the controller must be protected by a lockable cabinet. Use of external SD card is not permitted. 
CR 4.2   Information persistence SL2 Reset 1 and reset 2 set back the device to factory defaults securely.
CR 4.3 Use of cryptography SL1 PLCnext provides TLS for the communication channels (HTTPS, OPC UA, ...).
The cryptography is based on openssl and offers state-of-the-art security mechanisms.

FR5 – Restricted data flow (RDF)

No. Description Security Level Fulfillment Links
CR 5.1 Network segmentation SL1 PLCnext provides separate Ethernet interfaces. Each controller may require different configuration options for network segmentation.

FR6 – Timely response to events (TRE)

No. Description Security Level Fulfillment Links
CR 6.1 Audit log accessibility SL1 PLCnext provides a security logging to log all auditable actions and events. 
CR 6.1
RE1  
Programmatic access to audit logs SL3 PLCnext provides a security logging to log all auditable actions and events and provides it to central logging server via syslog-ng.
CR 6.2 Continuous monitoring SL2 PLCnext provides a security logging to log all auditable actions and events and provides it to central logging server via syslog-ng.

FR7 – Resource availability (RA)

No. Description Security Level Fulfillment Links
CR 7.1   Denial of service protection SL1 PLCnext provides netload limiter, firewall (nf-tables) to control the communication load. 
CR 7.1
RE1
Manage communication load from component SL2 PLCnext provides netload limiter, firewall (nf-tables) to control the communication load. The task management is designed to manage and recover from high communication load. 
CR 7.2   Resource management SL1 PLCnext provides netload limiter, firewall (nf-tables) to control the communication load and resource management. In addition, the task management controls execution and resource load. 
CR 7.3 Control system backup SL1 PLCnext provides an app to start a backup during normal operations. 
It generates a backup file which must be transferred to the location for backups defined by the system. The backup file can be explicitly downloaded by SSH access, via the OPC UA file interface or automatically by configuring rsync daemon. The function of the app and scope of the backup data is configurable and can also be executed called from system tools like cron jobs, or similar. 
CR 7.3
RE1
Backup integrity verification SL2 PLCnext’s backup data is integrity protected. Before starting a restore the data integrity is validated. 
CR 7.4 Control system recovery and reconstitution SL1 PLCnext provides recovery after a disruption or failure. 
To recover a device based on the backup data, it must be set to delivery status by reset 1,
configured according to the system configuration and Security Profile must be activated.
The restore data is provided as an app itself and is installed by starting the app.
 
CR 7.6   Network and security configuration settings SL1 PLCnext provides that the network and security configuration can be set via the WBM.
CR 7.7   Least functionality SL1 PLCnext provides that the Security Profile follows the principle of least functionality: only components that have been considered in the threat analysis may run. This specifies exactly what is permissible. This specifies exactly what is permissible.
CR 7.8   Control system component inventory SL2 PLCnext provides via OPC UA (device info) the component inventory information.

Embedded device requirement (EDR)

No. Description Security Level Fulfillment Links
EDR 2.4 Mobile code SL1 PLCnext provides integrity of data in transition by using TLS. The User Management controls the access permission to the mobile code in rest. Physical access to the controller must be protected by a lockable cabinet. Use of external SD card is not permitted. 
EDR 2.4
RE1
Mobile code authenticity check SL2 PLCnext provides integrity of data in transition by using TLS. The User Management controls the access permission to the mobile code in rest. Physical access to the controller must be protected by a lockable cabinet. Use of external SD card is not permitted. 
EDR 2.13 Use of physical diagnostic and test interfaces SL2 PLCnext protects access to physical test and diagnostic interfaces through the housing. Interfaces cannot be accessed through the housing with testbed adapters. The device must be protected in a lockable cabinet.
The device and SD card must be shipped in a secure manner.
EDR 3.2 Protection from malicious code SL1 PLCnext provides protection from malicious code  by using TLS for data in transition. The User Management controls the access permission to the data in rest.
EDR 3.10 Support for updates SL1 PLCnext provides a WBM page to install updates. OPC UA Software Update is supported to integrate PLCnext into the Device and Patch Management Service. 
EDR 3.10
RE1
Update authenticity and integrity SL2 PLCnext provides RAUC update containers signed with an X509.3 certificate from a product vendor. Before installation, the authenticity and integrity of the update is verified. All update files provided via the download center are verifiable with a SHA 256.
EDR 3.11 Physical tamper resistance and detection SL2 PLCnext provides that the cabinet must be locked; application must supervise cabinet accesses.
EDR 3.12 Provisioning product supplier roots of trust SL2 PLCnext provides a device identifier called IdevID.
This device identity is installed during production and protected by the TPM.
The boot integrity check validates the further trust roots such as firmware update.
EDR 3.13 [1] Provisioning asset owner roots of trust SL2 PLCnext provides the Certificate Authentication web page to install Asset Owner Roots of Trust via the Trust Store mechanism.
Devices (SD cards) containing installed Asset Owner Roots of Trust must be specially protected in the field by locked cabinets in the field and must not be sent to other sites without special protection from physical access.
EDR 3.14 Integrity of the boot process SL1 PLCnext provides a partial boot integrity check for the OS and FW prior starting the PLC function. The result is shown in the WBM and a notification in the security logging is generated. 
EDR 3.14
RE1
Authenticity of the boot process SL2 PLCnext provides a partial boot integrity check for the OS and FW based on the root of trust of the device.
  1. This requirement is implemented for AXC F1152, AXC F 2152, AXC F 3152 and AXC F XT SPLC 1000 hardware.
    You can find out whether the other controllers fulfill this requirement on the details page of the respective controller (e. g. BPC 9102S).

Network device requirement (NDR)

No. Description Security Level Fulfillment Links
NDR 1.13 Access via untrusted networks SL1 PLCnext provides separate Ethernet interfaces. Each controller may require different configuration options for network segmentation. By using the firewall, access via untrusted networks is managed. 
NDR 1.13
RE1
Explicit access request approval SL3 PLCnext provides separate Ethernet interfaces. Each controller may require different configuration options for network segmentation. By using the firewall, access via untrusted networks is managed. The firewall is configured to reject output and input communication requests by default. Only explicitly configured communication requests are allowed. 
NDR 5.2 Zone boundary protection SL1 PLCnext provides separate Ethernet interfaces. Each controller may require different configuration options for network segmentation. By using the netload limiter and firewall, zone boundary protection can be established. 
NDR 5.2
RE1
Deny all, permit by exception SL2 PLCnext provides separate Ethernet interfaces. Each controller may require different configuration options for network segmentation. By using the firewall, access via untrusted networks is managed. The firewall is configured to reject output and input communication requests by default. Only explicitly configured communication requests are allowed. 
NDR 5.2
RE2
Island mode SL3 PLCnext provides separate Ethernet interfaces. Each controller may require different configuration options for network segmentation. By using the Netload Limiter and firewall, zone boundary protection can be established. The firewall can be configured for each Ethernet interface. 
NDR 5.3 General purpose, person-to-person communication restrictions  SL1 PLCnext provides firewall configurations to reject output and input communication requests by default. Only explicitly configured communication requests including dedicated ports as well as IP addresses are allowed.

 

 

 


•  Web browser recommendation: Chrome/Edge 88 or newer, Firefox ESR 90 or neweror Safari  • 
• Published/reviewed: 2023-11-02 • Revision 011 •