Research Article

Advanced Approach to Information Security Management System Model for Industrial Control System

Table 6

Comparison for common security controls of NIST SP 800-53 and safety requirements of IEC 61511.

NumberMain domain nameCode of security control for common security controls in South Korea Energy IndustrySafety requirements of IEC 61511

1Access controlAC-2
Enabling and disabling the read-write access shall be carried out only by a configuration or programming process using the maintenance/engineering interface with appropriate documentation and security measures.
2AC-5
3AC-6

4Media protectionMP-2
5MP-3.a
6MP-3.b
7MP-4.a
8MP-4.b
9MP-5.a
10MP-5.c

11Physical and environmental protectionPE-2
For subsystems that on loss of power do not fail to the safe state, all of the following requirements shall be met and action taken according to 11.3:
(i) loss of circuit integrity is detected (for example, end-of-line monitoring);
(ii) power supply integrity is ensured using supplemental power supply (for example, battery back-up and uninterruptible power supplies);
(iii) loss of power to the subsystem is detected.
12PE-6.a
13PE-6.b
14PE-7
15PE-10
16PE-12
17PE-13
18PE-14
19PE-15
20PE-18

21System and communications protectionSC-5
The communication interface shall be sufficiently robust to withstand electromagnetic interference including power surges without causing a dangerous failure of the SIF.
22SC-7.a
23SC-7.b