A key standard for organizations with an operational technology environment is ISA/IEC 62443, a series of international standards and technical reports for industrial automation and control systems (IACS) security. While organizations will have varying levels of risk and fall into different security levels (SL), each foundational requirement (FR) in ISA/IEC 62443 is widely recognized and adopted by industry professionals and organizations around the world. The system requirements (SR) apply to control systems in IACS environments, and implementing these controls will extend robust security to all critical infrastructure environments.
Cyolo can help achieve any security level of ISA/IEC 62443 compliance by providing reliably fast connections, granular access control, multi-factor authentication (MFA), encryption, continuous monitoring, and compliance reporting capabilities. As companies connect to the control systems of their IACS, Cyolo excels in meeting security challenges and aligning with the ISA/IEC 62443 standards.
Access Management: Cyolo deploys granular access controls to ensure that only authorized individuals can access IACS. The Cyolo solution provides dynamic, context-based access control policies that can adapt to changing circumstances, such as the user’s location, device type, and the sensitivity of the information being accessed.
Multi-Factor Authentication: Cyolo implements multi-factor authentication (MFA) to ensure that individuals are properly identified and authenticated before being granted access to IACS. Even legacy and offline systems that do not natively support modern authentication protocols can be retrofitted by Cyolo with MFA capabilities.
Encryption: Cyolo encrypts data from end-to-end and never decrypts the traffic in their cloud. This makes Cyolo a truly trustless zero-trust access solution, ideal for protecting access to IACS.
Continuous Monitoring: Cyolo continuously monitors and logs user activity to ensure that access to IACS is being used in accordance with applicable corporate policies and regulations.
Cyolo is a member of the ISA Global Cybersecurity Alliance. The Cyolo solution is designed to give users access to the resources they need while upholding the zero-trust model. It is built to support the real world, allowing companies to protect their entire network. With Cyolo, you can securely access the resources you need to get your work done, while keeping your IACS safe and operational.
FR 1 – IDENTIFICATION AND AUTHENTICATION CONTROL
Human user identification and authentication
Software process and device identification and authentication
Wireless access management
Strength of password-based authentication
Public key infrastructure (PKI) certificates
Strength of public key authentication
Unsuccessful login attempts
System use notification
Access via untrusted networks
FR 2 – USE CONTROL
Remote session termination
Audit storage capacity
Response to audit processing failures
FR 3 – SYSTEM INTEGRITY
Malicious code protection (SL-2)
Protection of audit information (SL-3)
FR 4 – DATA CONFIDENTIALITY
FR 5 – RESTRICTED DATA FLOW
Zone boundary protection
General purpose person-to-person communication restrictions
FR 6 – TIMELY RESPONSE TO EVENTS
Audit log accessibility