SSA 200 Chartered Lab Ops and Accred (v2 - 6) PDF
SSA 200 Chartered Lab Ops and Accred (v2 - 6) PDF
Version 2.6
August 2018
Copyright © 2010-2018 ASCI - Automation Standards Compliance Institute, All rights reserved
A. DISCLAIMER
ASCI and all related entities, including the International Society of Automation (collectively, “ASCI”) provide all
materials, work products and, information (‘SPECIFICATION’) AS IS, WITHOUT WARRANTY AND WITH ALL
FAULTS, and hereby disclaim all warranties and conditions, whether express, implied or statutory, including, but not
limited to, any (if any) implied warranties, duties or conditions of merchantability, of fitness for a particular purpose, of
reliability or availability, of accuracy or completeness of responses, of results, of workmanlike effort, of lack of viruses,
and of lack of negligence, all with regard to the SPECIFICATION, and the provision of or failure to provide support or
other services, information, software, and related content through the SPECIFICATION or otherwise arising out of the
use of the SPECIFICATION. ALSO, THERE IS NO WARRANTY OR CONDITION OF TITLE, QUIET ENJOYMENT,
QUIET POSSESSION, CORRESPONDENCE TO DESCRIPTION, OR NON-INFRINGEMENT WITH REGARD TO
THE SPECIFICATION.
WITHOUT LIMITING THE FOREGOING, ASCI DISCLAIMS ALL LIABILITY FOR HARM TO PERSONS OR
PROPERTY, AND USERS OF THIS SPECIFICATION ASSUME ALL RISKS OF SUCH HARM.
IN ISSUING AND MAKING THE SPECIFICATION AVAILABLE, ASCI IS NOT UNDERTAKING TO RENDER
PROFESSIONAL OR OTHER SERVICES FOR OR ON BEHALF OF ANY PERSON OR ENTITY, NOR IS ASCI
UNDERTAKING TO PERFORM ANY DUTY OWED BY ANY PERSON OR ENTITY TO SOMEONE ELSE. ANYONE
USING THIS SPECIFICATION SHOULD RELY ON HIS OR HER OWN INDEPENDENT JUDGMENT OR, AS
APPROPRIATE, SEEK THE ADVICE OF A COMPETENT PROFESSIONAL IN DETERMINING THE EXERCISE OF
REASONABLE CARE IN ANY GIVEN CIRCUMSTANCES.
SSA-200-2.6 2/44
Revision history
version date changes
1.2 2014.02.09 Initial version published to http://www.ISASecure.org
Change from Guide 65 to 17065, incorporate ASCI 2009
requirements directly, add figure 1, change SDLA to SDLPA when
1.9 2015.02.24 used for assessment, permit GICSP in qualifications, full software
version required on CRT reports SSA.R19, CRT tool calibration not
required SSA.R28
Alignment with approved ANSI/ISA-62443-4-1: update references,
background section, replace section 5.3 with discussion of
transition to SSA 2.1.0; explicitly support scalable systems: add
definitions of layout, reference layout, reference system, scalable
2.5 2018.02.02
system, modify 4.1 scope, add scalability topics to technical
readiness assessment; add CACE and CACS as certifications for
auditors and permit any bachelor-level degree with sufficient
industry experience; incorporate errata from SSA -102 v1.6
Alignment with ISA-62443-4-2: update normative references; in 4.1
2.6 2018.08.10
modify sentence about FSA-E
SSA-200-2.6 3/44
Contents
1 Scope 8
2 Normative references 8
2.1 General 8
2.2 Accreditation/recognition 8
2.3 ISASecure symbol and certificates 9
2.4 Technical specifications 9
2.5 External references 11
3 Definitions and abbreviations 11
3.1 Definitions 11
3.2 Abbreviations 15
4 Background 16
4.1 Technical ISASecure SSA certification elements 16
4.2 ISASecure SSA certification program implementation 18
5 Summary of operations and accreditation requirements 18
5.1 Overview 18
5.2 Accreditation process 19
5.3 Transition to SSA 2.1.0 19
6 Requirements on operations of chartered laboratories 19
6.1 Overview 19
6.2 General requirements 20
6.3 Structural requirements 22
6.4 Resource requirements 24
6.5 Process requirements 29
6.6 Management system requirements 37
7 Accreditation of chartered laboratories 39
7.1 Overview 39
7.2 Provisional chartered laboratory status 40
7.3 Technical readiness assessment 40
List of requirements
Requirement SSA.R1 – Confidentiality for ASCI and ISCI 21
Requirement SSA.R2 – Confidentiality of CRT laboratory results 22
Requirement SSA.R3 – Internal distribution for assessment reports 22
Requirement SSA.R4 – Public availability of ISCI complaint escalation process 22
Requirement SSA.R5 – Time delay from provision of consultancy 22
Requirement SSA.R6 – Notification of changes to certification re quirements 22
Requirement SSA.R7 – Organizational affiliations 23
Requirement SSA.R8 – Financial affiliations 23
SSA-200-2.6 4/44
Requirement SSA.R9 – Chartered laboratory sales and purchases 24
Requirement SSA.R10 –FSA-S, FSA-E, SDA-S and SDLPA auditor minimum qualifications 25
Requirement SSA.R11 – CRT/NST lead evaluator minimum qualifications 27
Requirement SSA.R12 – VIT lead evaluator minimum qualifications 28
Requirement SSA.R13 – Currency of skills and knowledge 29
Requirement SSA.R14 – Determining application of specifications 32
Requirement SSA.R15 – Determining applicant eligibility 32
Requirement SSA.R16 – Application steps procedure 32
Requirement SSA.R17 – Maintenance of procedure for application 32
Requirement SSA.R18 – Current ISASecure specifications 32
Requirement SSA.R19 – CRT tools 32
Requirement SSA.R20 – Monitoring essential functions as non-standard test methods 33
Requirement SSA.R21 – SRT report 33
Requirement SSA.R22 – Assessment report 33
Requirement SSA.R23 – Application information from CRT laboratory 33
Requirement SSA.R24 – Consideration of evidence from CRT laboratories 33
Requirement SSA.R25 – Verification of content for evidence from CRT laboratory 33
Requirement SSA.R26 – Verification of test outcomes for evidence from CRT laboratory 33
Requirement SSA.R27 – Verification of versions for evidence from CRT laboratory 34
Requirement SSA.R28 – Equipment calibration 34
Requirement SSA.R29 – Content of test or assessment methods or procedures 34
Requirement SSA.R30 – Detail in SRT procedures 34
Requirement SSA.R31 – Content of test or assessment data sheet 35
Requirement SSA.R32 – Content of procedure maintenance procedures 35
Requirement SSA.R33 – Content of procedures for evaluating test or assessment data 35
Requirement SSA.R34 – Content of policy for evaluation of test or assessment data 35
Requirement SSA.R35 – Content of procedures for preparing technical reports 35
Requirement SSA.R36 – Input to scheme directory 35
Requirement SSA.R37 – Accuracy of certification status 35
Requirement SSA.R38 – Withdrawal of certification 36
Requirement SSA.R39 – Notification of withdrawal of certification 36
Requirement SSA.R40 – Complaints related to CRT performed by CRT laboratory 36
Requirement SSA.R41 – Escalation for complaints and appeals 36
Requirement SSA.R42 – Escalation for complaints and appeals related to application of specifications 37
Requirement SSA.R43 – Scope of procedures under management system 38
Requirement SSA.R44 – Responsibility for quality 38
Requirement SSA.R45 – Housekeeping 38
Requirement SSA.R46 – Item inventory 38
Requirement SSA.R47 – Facility security 38
SSA-200-2.6 5/44
Requirement SSA.R48 – Processing for revisions to normative specifications 38
Requirement SSA.R49 – Archival of superseded specifications 38
Requirement SSA.R50 – Maintenance of records 38
Requirement SSA.R51 – Management follow-up review for deficiencies 38
Requirement SSA.R52 – Basis for internal audits 39
Requirement SSA.R53 – Contents included in internal audit reports 39
Requirement SSA.R54 – Internal audits of satellite facilities 39
Requirement SSA.R55 – Implementation for permanent corrective actions 39
Requirement SSA.R56 – Supplier process for disclosure of complaints related to noncompliance 39
Requirement SSA.R57 – Supplier process for disclosure of complaints related to security of
ISASecure certified product 39
Requirement SSA.R58 – Disclosure to ISCI of complaints related to ISASecure certified product 39
List of tables
Table 1 – Scheme references for ISO/IEC clause 4 20
Table 2 – Scheme reference for ISO/IEC 17065 clause 5 23
Table 3 – Scheme references for ISO/IEC 17065 clause 6 24
Table 4 – FSA-S, FSA-E, SDA-S, and SDLPA auditor qualifications 25
Table 5 – CRT or NST lead evaluator qualifications 27
Table 6 - VIT lead evaluator qualifications 28
Table 7 – ISO/IEC 17020 requirements specified 29
Table 8 – Scheme reference for ISO/IEC 17065 clause 7 30
Table 9 - Technical readiness criteria for SSA chartered laboratory 41
SSA-200-2.6 6/44
FOREWORD
This is one of a series of documents that defines ISASecure ® certification for control systems, which is
developed and managed by the industry consortium ISA Security Compliance Institute (ISCI). Certifications
available include ISASecure Embedded Device Security Assurance (EDSA) for embedded devices,
ISASecure System Security Assurance (SSA) for systems and ISASecure Security Development Lifecycle
Assurance (SDLA) which addresses control system supplier development processes. This specification is
one of the series of documents that describes requirements for ISASecure SSA certification. The current list
of documents related to ISASecure certification programs can be found on the web site
http://www.ISASecure.org.
SSA-200-2.6 7/44
1 Scope
The ISASecure ® certification program has been developed by an industry consortium called the ISA Security
Compliance Institute (ISCI) with a goal to accelerate industry wide improvement of cyber security for
Industrial Automation and Control Systems (IACS). An organization that performs evaluations and grants
certifications under the ISASecure SSA (System Security Assurance) program for control systems is referred
to as an ISASecure SSA chartered laboratory, or (more briefly) a chartered laboratory. This document
specifies the criteria and processes that define:
• How a chartered laboratory shall begin and continue ISASecure SSA system certification operations
(Section 7).
This document provides a complete reference to these sources, and details ISASecure SSA program-specific
requirements for compliance with applicable general specifications and standards.
• Embedded devices, the ISASecure EDSA program (Embedded Device Security Assurance); and
• Supplier development process for control systems and compo nents, the ISASecure SDLA program
(Security Development Lifecycle Assurance).
The separate documents EDSA-200 ISASecure EDSA chartered laboratory operations and accreditation and
SDLA-200 ISASecure SDLA chartered laboratory operations and accreditation address these same topics as
they relate to chartered laboratories that perform ISASecure EDSA and SDLA certifications, respectively.
It is a goal for the ISASecure programs to support and align with the developing standard s ISA 62443 for
IACS security. [SSA-100] discusses the relationship between ISASecure SSA and the ISA 62443 effort.
2 Normative references
2.1 General
NOTE The following is the highest level document that describes the ISASecure SSA certification program for control systems.
2.2 Accreditation/recognition
[ISASecure-116] ISCI ISASecure Certification Programs - Policy for transition to EDSA 3.0.0 and SSA 3.0.0,
as specified at http://www.ISASecure.org
NOTE The following document can be tailored for chartered laboratories performing EDSA, SSA or S DLA certifications, or any
combination of these.
SSA-200-2.6 8/44
[ISASecure-202] ISCI ISASecure Certification Programs – Application and Contract for Chartered
Laboratories, internal ISCI document
[EDSA-206] ISCI Embedded Device Security Assurance – ISASecure EDSA CRT laboratory operations and
accreditation, as specified at http://www.ISASecure.org
[EDSA-201] ISCI Embedded Device Security Assurance –Recognition process for communication robustness
testing tools, as specified at http://www.ISASecure.org
[EDSA-203] ISCI Embedded Device Security Assurance - Application and Contract for CRT Tool Reco gnition,
internal ISCI document
[SSA-204] ISCI System Security Assurance – Instructions and Policies for Use of the ISASecure Symbol and
Certificates, as specified at http://www.ISASecure.org
[SSA-310] ISCI System Security Assurance – Requirements for system robustness testing, as specified at
http://www.ISASecure.org
NOTE 2 The following document defines how tests are carried out for both ISASecure EDSA and for several aspects of SSA SRT
(System Robustness Testing). It applies for ISASecure SSA to the extent described in [SSA -310].
[EDSA-310] ISCI Embedded Device Security Assurance – Embedded device robustness testing, as specified
at http://www.ISASecure.org
NOTE 3 The following documents provide the technical evaluation criteria for the Functional Security Assessment element of an SSA
evaluation.
SSA-200-2.6 9/44
[SSA-311] ISCI System Security Assurance – Functional security assessment for systems, as specified at
http://www.ISASecure.org
[CSA-311] ISCI Component Security Assurance – Functional security assessment for components, as
specified at http://www.ISASecure.org
NOTE 4 The following document provides the overall technical evaluation criteria for the Security Development Artifacts element of
an SSA product evaluation. [SDLA-312] is referenced by [SSA-312] and also provides the technical evaluation criteria for an
ISASecure assessment of supplier security development lifecycle process.
[SSA-312] ISCI System Security Assurance – Security development artifacts for systems, as specified at
http://www.ISASecure.org
[SDLA-312] ISCI Security Development Lifecycle Assurance – Security development lifecycle assessment, as
specified at http://www.ISASecure.org
NOTE 5 The following is the highest level document that describes the related ISASecure SDLA certification program for supplier
security development lifecycle processes. [SDLA-100] also lists all other documentation for the SDLA program.
[SDLA-100] ISCI Security Development Lifecycle Assurance – ISASecure Certification Scheme, as specified
at http://www.ISASecure.org
NOTE 6 The following document describes evaluation of a modified embedded device under ISASecure EDSA certification criteria,
where a prior version of the device was certified. These requirem ents apply when certification evidence for a prior version of an
embedded device component of a system is available toward an SSA certification.
[SSA-420] ISCI System Security Assurance – Vulnerability Identification Testing Policy Specification, as
specified at http://www.ISASecure.org
[EDSA-401] ISCI Embedded Device Security Assurance – Testing the robustness of implementations of two
common “Ethernet” protocols, as specified at http://www.ISASecure.org
[EDSA-402] ISCI Embedded Device Security Assurance – Testing the robustness of implementations of the
IETF ARP protocol over IPv4, as specified at http://www.ISASecure.org
[EDSA-403] ISCI Embedded Device Security Assurance – Testing the robustness of implementations of the
IETF IPv4 network protocol, as specified at http://www.ISASecure.org
[EDSA-404] ISCI Embedded Device Security Assurance – Testing the robustness of implementations of the
IETF ICMPv4 network protocol, as specified at http://www.ISASecure.org
[EDSA-405] ISCI Embedded Device Security Assurance – Testing the robustness of implementations of the
IETF UDP transport protocol over IPv4 or IPv6, as specified at http://www.ISASecure.org
[EDSA-406] ISCI Embedded Device Security Assurance – Testing the robustness of implementations of the
IETF TCP transport protocol over IPv4 or IPv6, as specified at http://www.ISASecure.org
SSA-200-2.6 10/44
2.5 External references
External references are documents that are used by the ISASecure SSA program but maintained outside of
the ISASecure program.
[ANSI/ISA-62443-1-1] ANSI/ISA-62443-1-1 (99.01.01) – 2007 Security for industrial automation and control
systems Part 1-1: Terminology, concepts and models
[IEC 62443-1-1] IEC TS 62443-1-1:2009 Industrial communication networks - Network and system security -
Part 1-1: Terminology, concepts and models
[ANSI/ISA-62443-3-3] ANSI/ISA-62443-3-3 (99.03.03) - 2013 Security for industrial automation and control
systems Part 3-3: System security requirements and security levels
[IEC 62443-3-3] IEC 62443-3-3:2013 Industrial communication networks - Network and system security - Part
3-3: System security requirements and security levels
[ANSI/ISA-62443-4-1] ANSI/ISA - 62443-4-1-2018 Security for industrial automation and control systems Part 4-1:
Secure product development lifecycle requirements
[IEC 62443-4-1] IEC 62443-4-1:2018 Security for industrial automation and control systems Part 4-1: Secure product
development lifecycle requirements
[ANSI/ISA-62443-4-2] ANSI/ISA-62443-4-2-2018 Security for industrial automation and control systems Part
4-2: Technical security requirements for IACS components
NOTE The following standard is pending final approval and publication as of the publication of the present specification.
[IEC 62443-4-2] IEC 62443-4-2:2018 Security for industrial automation and control systems Part 4 -2:
Technical security requirements for IACS components
[ISO/IEC 17065] ISO/IEC 17065, “Conformity assessment - Requirements for bodies certifying products,
processes, and services”, September 15, 2012
[ISO/IEC 17025] ISO/IEC 17025, “General requirements for the competence of testing and calibration
laboratories”, 15 May 2005
[ISO/IEC 17011] ISO/IEC 17011, “Conformity assessment – General requirements for accreditation bodies
accrediting conformity assessment bodies”, 01 September 2004
3.1.1
accreditation
third party attestation related to a conformity assessment body conveying formal demonstr ation of its
competence to carry out specific conformity assessment tasks
SSA-200-2.6 11/44
NOTE For ISASecure certification programs, accreditation is an assessment and recognition process via which an organization is
granted chartered laboratory status or CRT laboratory status.
3.1.2
accreditation body
third party that performs attestation, related to a conformity assessment body, conveying a formal
demonstration of its competence to carry out specific conformity assessment
3.1.3
applicant
organization that has submitted a product or process to a chartered laboratory for evaluation for ISASecure
certification
3.1.4
auditable product
hardware and/or software product such that the product or its associated development process is subject to
audit, in the course of a specific chartered laboratory's planned certification activities
3.1.5
capability security level
security level that a component or system can provide when properly configured and integrated
NOTE This type of security level states that a particular component or system is capable of meeting a target security level natively
without additional compensating countermeasures when properly configured and integrated.
3.1.6
certification body
third-party conformity assessment body operating certification schemes
3.1.7
certification level
number associated with a particular certification granted, where requirements to achieve that certification
increase in rigor for higher levels
NOTE An SSA certification for a particular security zone may be SSA Level 1, 2, 3, or 4. A zone certified to SSA Level n meets
requirements for capability security level n as defined in the standard [ANSI/ISA-62443-3-3].
3.1.8
certification scheme
certification system related to specific products, processes, or services, to which the same specified
requirements, specific rules and procedures apply
3.1.9
chartered laboratory
organization chartered by ASCI to evaluate products and/or processes under one or more ISASecure
certification programs and to grant certifications under one or more of these programs
NOTE A chartered laboratory is the certification body for the ISASecure certification programs.
3.1.10
conformity assessment body
body that performs conformity assessment services and that can be the object of accreditation
NOTE Examples are a laboratory, inspection body, product certification body, management system certification body and personnel
certification body. This is an ISO/IEC term and concept.
3.1.11
control system
hardware and software components of an IACS
NOTE Control systems include systems that perform monitoring functions.
SSA-200-2.6 12/44
3.1.12
CRT evidence submission
set of CRT results for an embedded device submitted by a CRT laboratory to a chartered laboratory on
behalf of the device supplier, toward ISASecure certification
3.1.13
CRT laboratory
organization authorized by ASCI to perform communic ation robustness testing for embedded devices and
submit results to a chartered laboratory toward an ISASecure EDSA or SSA certification
3.1.14
embedded device
special purpose device running embedded software designed to directly monitor, control or actuate an
industrial process
NOTE Attributes of an embedded device are: no rotating media, limited number of exposed services, programmed through an
external interface, embedded OS or firmware equivalent, real -time scheduler, may have an attached control panel, ma y have a
communications interface. Examples are: PLC, field sensor devices, SIS controller, DCS controller .
3.1.15
full software version identifier
lowest level of granularity identifier used by a supplier for change tracking on software
NOTE Will include multiple digits and may include a date in some cases. This typically has more digits than the version number used
by customers.
3.1.16
evidence impact assessment
identification of that portion of the evidence from the certification evaluation of a product, which may be
applied toward the certification of a modified version of the product, and of those aspects of the evaluation
which must be performed on the modified product and new evidence created
3.1.17
industrial automation and control system
collection of personnel, hardware, software and policies involved in the operation of the industrial process
and that can affect or influence its safe, secure, and reliable operation
3.1.18
layout
description of a specific instance of a scalable control system, that defines quantities of z ones and resident
devices, and internal and external interfaces
3.1.19
major owner
owner of more than two percent (2%) of a business entity
NOTE This percentage is intended to exclude individuals who are owners via portfolio vehicles, and identify owners tha t may
influence the activities of the business entity.
3.1.20
major user
organization that has or plans purchase of products whose related costs and/or usage is material to the
overall operations of that organization
3.1.21
reference layout
specific layout for scalable control system, that represents security characteristics found in any layout to be
SSA certified, in a manner suitable to support certification testing that provides assurance for all such layouts
NOTE A reference layout may be neither the minimum nor the maximum layout for a scalable system. Its properties are specified in
requirements found in [SSA-300]. In overview, the reference layout for a contro l system includes all zones, resident devices in these
zones, interfaces and protocols present in an y layout in scope for a certification.
SSA-200-2.6 13/44
3.1.22
reference system
physical instance of a control system, that adheres to a reference layout
NOTE A reference system is used for direct testing performed by the SSA certifier.
3.1.23
scalable control system
control system which supports replication of zones and/or devices to support small and large installations
3.1.24
significant financing
financing that is material to the operations of the recipient
3.1.25
significant financial interest
financial interest where the value of this i nterest is material to the financial position of the entity that has the
interest
3.1.26
significant sales
sales that are material to the operations of the seller
3.1.27
security level
measure of confidence that the IACS is free from vulnerabilities and functions in the intended manner
NOTE Vulnerabilities can either be designed into the IACS, inserted at any time during its lifecycle or result from changing threa ts.
Designed-in vulnerabilities may be discovered long after the initial deployment of the IACS, for e xample an encryption technique has
been broken or an improper policy for account management such as not removing old user accounts. Inserted vulnerabilities may be
the result of a patch or a change in policy that opens up a new vulnerability.
3.1.28
security zone
grouping of logical or physical assets that share common security requirements
NOTE A zone has a clear border. The security policy of a zone is typically enforced by a combination of mechanisms both at the
zone edge and within the zone.
3.1.29
symbol
graphic or text affixed or displayed to designate that ISASecure certification has been achieved
NOTE An earlier term for symbol is “mark.”
3.1.30
system
control system
NOTE In the ISASecure SSA documentation, this shorter term is used for convenience to refer to a control system product that may
fall under the scope of ISASecure SSA certification. Per the definition above, control systems include safety systems.
3.1.31
zone
security zone
SSA-200-2.6 14/44
3.2 Abbreviations
SSA-200-2.6 15/44
SY system
SUT system under test
TCP transmission control protocol
TD test device
UDP user datagram protocol
VIT vulnerability identification testing
4 Background
4.1 Technical ISASecure SSA certification elements
ISASecure SSA is a certification program for control systems, where a control system product is considered
to be within the scope of this program if it satisfies all of the following criteria:
• The control system consists of an integrated set of components and includes more than one device.
• The control system is available from and supported as a whole by a single supplier, although it may
include hardware and software components from several manufacturers.
• The control system may have a fixed device and zone layout, or may be scalable, that is, may permit
replication of devices and of zones in order to scale for small and large installations.
In order to obtain ISASecure SSA certification, a supplier must pass a security development lifecycle
process evaluation equivalent to that defined under the ISASecure SDLA development process certification
described in the reference [SDLA-100]. Specifically, in order for a system product from a supplier to achieve
ISASecure SSA certification, either:
• The supplier passes a security development lifecycle process assessment (SDLPA), which is an
equivalent evaluation of security aspects of their development process, as part of the SSA evaluation
itself.
A supplier may apply for ISASecure SSA and SDLA certifications in parallel.
SDLPA and SDA-S both assess development process, hence are grouped under "Security Development
Assessment" in Figure 1 below. SDA-S examines the artifacts that are the outputs of the supplier’s security
development lifecycle processes as they apply to the system to be certified. FSA-S examines the security
capabilities of the system. FSA-E examines the security capabilities of any embedded devices that are
components of the system, recognizing in accordance with [ANSI/ISA-62443-4-2] that in some cases
requirements for security functionality may be met by integrating the device into a system . SRT has three
major elements - Vulnerability Identification Testing (VIT), Communication Robustness Testing (CRT) and
SSA-200-2.6 16/44
Network Stress Testing (NST). VIT scans all components of a system for the presence of known
vulnerabilities. CRT and NST verify that the system adequately maintains essential functions while being
subjected to normal and erroneous network protocol traffic at normal to extremely high traffic rat es (flood
conditions) at its network interfaces.
A system submitted for certification is comprised of one or more security zones. The supplier identifies a
certification level for each zone, which will be the desired capability security level to be demonstrated for that
zone by the certification. The SDLPA and SDA-S assessments are the same for all certification levels with
the exception of allowable residual risk for known security issues. The FSA-S evaluation is applied to each
security zone; required security capabilities will differ based upon the zone certification level. Pass/fail
criteria for VIT reference FSA-S requirements applicable to the certification level , hence also increase in rigor
for higher levels. CRT and NST criteria are the same regardless of certification level. Figure 1 illustrates this
concept. The ISASecure SSA certificate for a system will name the security zones and their certification
levels.
For scalable systems, tests performed by the certifier as part of FSA or SRT will be performed on a reference
system, whose layout meets criteria specified in [SSA-300]. Analyses performed by the certifier will take into
account all layouts to be evaluated under the certification.
If the system has a component embedded device that is ISASecure EDSA certified, that certification may be
leveraged to meet CRT and FSA requirements for SSA certification of the ov erall system, to the extent
specified in [SSA-300].
In addition to requirements for initial certification, ISASecure SSA specifies requirements for maintaining
certification when a certified system and/or ISASecure criteria are modified, as described in [ SSA-301].
SSA-200-2.6 17/44
4.2 ISASecure SSA certification program implementation
ISCI is organized as an interest area within ASCI (Automation Standards Compliance Institute) , a not-for-
profit 503 (c) (6) corporation owned by ISA. Descriptions of the governance and organizational structure for
ASCI are found on the ISASecure website: http://www.ISASecure.org.
ASCI ISASecure SSA chartered laboratories are organizations that are accredited to evaluate systems under
the ISASecure SSA program. ASCI grants accredited laboratories the right to process ISASecure SSA
certifications for systems on its behalf and issue certificates for systems meeting the SSA certification
requirements. System certification is determined based upon tests, functional audits and process audits,
which measure adherence to the ISASecure SSA requirements.
Evaluations for all SSA certification elements described in 4.1 are conducted directly by the chartered
laboratory or its subcontractors, with the possible exception of the CRT element of SRT for embedded
devices. The chartered laboratory shall directly conduct CRT for all types of system components with the
possible exception for embedded device components of the system presented for certification. CRT test for
such embedded device components may be conducted by a separate accredited organization called a CRT
laboratory, which submits test evidence to the chartered laboratory for evaluation. However, a chartered
laboratory must be qualified and prepared to conduct CRT for all types of components, including embedded
devices.
The lists of ASCI ISASecure SSA chartered laboratories and CRT laboratories are posted on the ISCI
website at http://www.ISASecure.org. At the request of system suppliers, systems that are issued
certifications are registered on this same ISCI website.
The ISASecure EDSA and SSA certification programs require the use of a test tool for CRT and NST. A tool
is used by chartered laboratories to perform CRT and NST, by CRT laboratories to perform CRT and by
device and system suppliers in preparation for certification. CRT/NST test tools must be evaluated for
consistency and fairness to ensure that they are appropriate for use by ISASecure test laboratories. ISCI
operates a test tool recognition program to support these objectives. The program is described in document
[EDSA-201].
In addition, the ISASecure SSA program requires the use of the Nessus ® tool
(http://www.tenable.com/products/nessus) for performing the VIT element of SRT. Nessus may also be used
by suppliers in preparation for certification.
ISASecure SSA will operate as an internationally recognized certification program. To meet this standard, the
chartered laboratory operations and accreditation requirements are designed to comply with accepted
international standards applicable to product certification and t esting.
The operations of ISASecure SSA chartered laboratories shall be in compliance with the applicable
requirements in:
• [ISO/IEC 17065], the international standard that applies to bodies that certify products, processes or
services, and
The present document is organized using the outline of [ISO/IEC 17065]. Where required, it interprets
requirements in that document for ISASecure SSA and adds additional requirements. Of particular note are
requirements for:
SSA-200-2.6 18/44
• Qualifications for chartered laboratory personnel ( 6.4.3.1);
• Content of chartered laboratory application and evaluation procedures ( 6.5.3.1.2 and 6.5.3.2.3)
Accreditation of a chartered laboratory consists of an assessment of the organization against the general
requirements in ISO/IEC 17025, 17065 and the specific requirements in Section 6 of this document, together
with an assessment of technical readiness for performing ISASecure SSA evaluations, described in Section
7.3. Technical readiness assessment is based upon review of laboratory processes and procedures as well
as review of artifacts from evaluation activities. To be recognized as a chartered laboratory for the ISASecure
SSA program, a laboratory shall attain the following accreditations, performed by an IAF/ILAC accreditation
body:
• Accredited to ISO/IEC 17065, with technology scope of accr editation covering ISASecure SSA
certification; and
• Accredited to ISO/IEC 17025, with technology scope of accreditation covering testing to ISASecure SSA
SRT specifications.
The laboratory accreditation process consists of two steps. In the first step, an IEC assessor who is qualified
with respect to the above two accreditations will complete an evaluation of all accreditation requirements.
Provisional chartered status is granted if ISCI's analysis of the assessor’s report following this evaluation,
shows that the laboratory meets the requirements for formal accreditation and technical readiness
assessment listed in 7.2 of the present document that may be verified based upon process and procedure
documentation evidence. At this point the accreditation body has not yet formally granted accreditation,
which requires a review and approval process internal to the accreditation body.
Once a laboratory has attained provisional chartered status, ASCI grants that laboratory the right to p erform
system evaluations and grant ISASecure SSA certifications. These rights continue as long as the laboratory
receives formal accreditation from an SSA accreditation body in a timely manner (the second step) and
maintains this status.
With the approval of the standard [ANSI/ISA-62443-4-1] for security development lifecycle requirements, the
SSA 2.0.0 program has been updated to SSA 2.1.0 to align with this standard. Accordingly, ISCI has defined
a policy for chartered labs to follow in transitioning certification activities from SSA 2.0.0 to SSA 2.1.0. This
policy is defined in the document [ISASecure-115].
Section 6 of the present document specifies all requirements on the operation of SSA chartered laboratories.
It provides specific interpretations for ISO/IEC 17065 requirements, and defines further requirements that are
specific to the ISASecure SSA program.
• The sub sections at numbering level 2 (6.2, 6.3, 6.4, 6.5, 6.6) each correspond to a clause in
[ISO/IEC 17065], covering in turn clauses 4-8 in that document.
SSA-200-2.6 19/44
• Each of these sub sections in the present document has three further sub sections as follo ws:
o Overview - provides a list of the topics covered in the corresponding clause of [ISO/IEC
17065]
o ISASecure SSA specific requirements - This sub section lists additional scheme specific
requirements, beyond those derived directly from [ISO/IEC 17065] together with the other
documents of the ISASecure SSA certification scheme.
6.2.1 Overview
Clause 4 General requirements in [ISO/IEC 17065] covers the following topics in associated sub clauses of
that document:
• Confidentiality (4.5)
The following table provides scheme references, for [ISO/IEC 17065] requirements in clause 4 of that
document that refer to certification scheme requirements.
SSA-200-2.6 20/44
ISO/IEC 17065 sub ISO/IEC 17065 Scheme topic ISASecure SSA
clause requirement reference referenced reference
agreement requirements on actions specified by scheme
taken by a client upon
loss of certification, and
on reproduction of
certification documents
This sub section lists additional scheme specific requirements related to Clause 4 General requirements in
[ISO/IEC 17065], beyond those derived from [ISO/IEC 17065] together with the other documents of the
ISASecure SSA certification scheme.
SSA-200-2.6 21/44
Requirement SSA.R2 – Confidentiality of CRT laboratory results
A chartered laboratory SHALL NOT have access to CRT informat ion generated by a CRT laboratory except
by permission of an applicant.
The chartered laboratory SHALL have processes to keep interested parties informed of changes to
certification requirements (such as changes to legal agreements associated with the certification process).
This SHALL include keeping the chartered laboratory’s ISASecure SSA certification clients informed of
changes to CRT requirements, whether or not the chartered laboratory directly performed CRT for the client
or whether it was performed by a CRT laboratory.
NOTE When technical changes in certification criteria occur, existing certifications t o the previous criteria remain in place, since the
certification applies to a particular product version. Hence no products can lose certification due to lack of communication of new
technical requirements. However, suppliers can do more effective planning related to future products based upon timely information
about upcoming changes (of all types) to the certification program requirements .
6.3.1 Overview
Clause 5 Structural requirements in [ISO/IEC 17065] covers the following topics in a ssociated sub clauses of
that document:
The following table provides scheme references, for [ISO/IEC 17065] requir ements in clause 5 of that
document that refer to certification scheme requirements.
SSA-200-2.6 22/44
Table 2 – Scheme reference for ISO/IEC 17065 clause 5
5.2 Mechanism for 5.2.1 (Notes 2 and 3) Certification scheme No unique requirements
safeguarding impartiality owner participation in specified by scheme
mechanism for
impartiality
This sub section lists additional scheme specific requirements rel ated to clause 5 Structural requirements in
[ISO/IEC 17065], beyond those derived from [ISO/IEC 17065] together with the other documents of the
ISASecure SSA certification scheme.
Additional requirements on financial and other organizational affiliations o f chartered laboratories are defined
as follows, to further safeguard impartiality.
When the separate legal entity as in [ISO/IEC 17065] 4.2.7 is a major user of certified products, the
personnel of the separate legal entity shall not be involved in the management of the certification body, the
review, or the certification decision.
The following requirements apply to a chartered laboratory regarding its financial affiliations with suppliers
and users of auditable products. The term "auditable product" is defined in 3.1.4. A supplier of auditable
products is typically a certification client of the chartered laboratory. However, other organizations could also
sell these products, and these cases are covered in this requirement as well.
o receive significant financing from a supplier or from a major user of auditable products, or
their major owners;
o have as a major owner, a organization that is a supplier or a major user of auditable products,
or a major owner of such an organization;
SSA-200-2.6 23/44
• A person involved in the management of the certification body, the review, or the cer tification decision
for the chartered laboratory SHALL NOT have a significant financial interest in a supplier or major
user of auditable products.
The following requirements apply to a chartered laboratory regarding its sales and purchase activities:
• A chartered laboratory SHALL NOT have significant sales of any products or services to suppliers of
auditable products, other than certification services;
• Prices and agreements related to any products or services that a chartered laboratory purchases from
a supplier of auditable products SHALL NOT have dependencies on related certification activity.
6.4.1 Overview
Clause 6 Resource requirements in [ISO/IEC 17065] covers the following topics in associated sub clauses of
that document:
The following table provides scheme references, for [ISO/IEC 17065] requirements in clause 6 of that
document that refer to certification scheme requirements.
SSA-200-2.6 24/44
ISO/IEC 17065 sub ISO/IEC 17065 Scheme topic ISASecure SSA
clause requirement reference referenced reference
6.1.2
Management of 6.1.2.1 b Certification scheme [SSA-200] 6.4.3.1
competence for requirements for training
personnel involved in the of personnel involved in
certification process certification
This sub section lists additional scheme specific requirements related to clause 6 Resource requirements in
[ISO/IEC 17065], beyond those derived from [ISO/IEC 17065] together with the other documents of the
ISASecure SSA certification scheme.
Requirement SSA.R10 –FSA-S, FSA-E, SDA-S and SDLPA auditor minimum qualifications
The [ISO/IEC 17065] requirement 6.1.2.1a) in the sub clause 6.1.1 Management of competence for personnel
involved in the certification process refers to competencies of personnel involved in the certification process.
The minimum qualifications for personnel that are res ponsible for evaluation to FSA-S, FSA-E and SDA-S
and SDLPA requirements SHALL include those specified in Table 4.
Then qualifications in Table 4 apply when SDLPA is carried out as part of an SSA evaluation.
The level of knowledge required for ISA 62443 as indicated in the last row of Tables 4-6, SHALL at a
minimum be sufficient for the individual to prepare and present a on e hour overview on the scope of
application and contents of the standard, and be capable of quickly finding the answers to questions about
what the standard requires on a particular topic, if given access to the text of the standard. For the other
security standards and practices listed in the table, the level of knowledge required SHALL at a minimum be
equivalent to 8 hours of training on the standard or practice.
SSA-200-2.6 25/44
Category of FSA –S auditor or FSA-E auditor SDA –S auditor
qualification / SDLPA auditor
experience
sufficient experience in
computer technology field
as specified below
Relevant auditing • Min 1 year experience performing technical • Min 1 year experience
work experience product audit OR 2 years in position in which performing software process
has been audited on 3 or more products audit OR 2 years in position
in which software process
has been audited on 3 or
more products
Relevant industry • General knowledge of at least two different • General knowledge of end-
specific knowledge IACS AND end software development
• General knowledge of application of IACS and life cycle AND
roles and duties of employees at sites using • General knowledge of IACS
IACS AND architectures
• Moderate level knowledge of networking and
communication protocols AND
• Able to independently read and interpret
requirement specifications for IACS products
AND
• Able to independently read and understand
SSA-200-2.6 26/44
Category of FSA –S auditor or FSA-E auditor SDA –S auditor
qualification / SDLPA auditor
experience
user installation and configuration documents
for IACS products AND
• Knowledge of methods used to protect
communications and detect / prevent
communication attacks
Knowledge of ISA 62443 Standard plus at least one of: ISA 62443 Standard plus at least
security standards • Common Criteria one of:
• ISO/IEC 27001 • Common Criteria
• IEC 61508 • ISO/IEC 27001
• IEC 61508
The [ISO/IEC 17065] requirement 6.1.2.1a) in the sub clause 6.1.1 Management of competence for personnel
involved in the certification process refers to competencies of personnel involved in the certification process.
The minimum qualifications for personnel that oversee the technical aspects of CRT or NST testing and
interpretation of results (including interpretation of CRT evidence submissions) shall include those specified
in Table 5:
SSA-200-2.6 27/44
Category of CRT or NST lead evaluator
qualification /
experience
communication attacks
Knowledge of ISA 62443 Standard plus at least one of:
security standards • Common Criteria
• ISO/IEC 27001
• IEC 61508
The [ISO/IEC 17065] requirement 6.1.2.1a) in the sub clause 6.1.1 Management of competence for personnel
involved in the certification process refers to competencies of personnel involved in the certification process.
The minimum qualifications for personnel that that are responsible for the technica l aspects of VIT testing
and interpretation of results shall include those specified in Table 6:
Table 6 - VIT lead evaluator qualifications
Relevant industry • Successful completion of training class or 1 year experience in job demonstrating
specific knowledge proficiency with VIT tool to be used AND
• General knowledge of at least two different IACS OR detailed knowledge of one
IACS AND
• Moderate level knowledge of networking and communication protocols AND
• Able to independently read and understand user installation and configuration
documents for IACS Products
Knowledge of ISA 62443 Standard plus at least one of:
security standards • Common Criteria
• ISO/IEC 27001
• IEC 61508
SSA-200-2.6 28/44
Requirement SSA.R13 – Currency of skills and knowledge
Staff training SHALL BE kept up-to-date and staff SHALL keep up-to-date of current normative specification
issues (includes participation in technical groups or committees).
The [ISO/IEC 17065] requirements 6.2.1 Internal resources and 6.2.1 External resources in the sub clause
6.2 Resources for evaluation refer to compliance with applicable requirements in ISO/IEC 17025, 17020, and
17021. Accreditation to ISO/IEC 17025 is required for an SSA chartered laboratory. Requirements from
ISO/IEC 17020 which apply to inspection activities, have been adapted and incorpora ted in this document as
follows and hence are noted but not repeated here:
("Inspection records" in
17020)
6.5.1 Overview
Clause 7 Process requirements in [ISO/IEC 17065] covers the following topics in associated sub clauses of
that document:
• General (7.1)
• Application (7.2)
• Evaluation (7.4)
• Review (7.5)
SSA-200-2.6 29/44
• Surveillance (7.9)
• Records (7.12)
The following table provides scheme references, for [ISO/IEC 17065] requirements in clause 7 of that
document that refer to certification scheme r equirements.
7.2 Application 7.2 Information that scheme [SSA-300] 5.2 and 5.3
requires for client requirements SY.R1 and
application R3 for initial certification;
requirements for
products with a version
previously certified are in
[SSA-301]
SSA-200-2.6 30/44
ISO/IEC 17065 sub ISO/IEC 17065 Scheme topic ISASecure SSA
clause requirement reference referenced reference
7.8 Directory of certified 7.8 last paragraph Information about [SSA-200] 6.5.3.3
products certified systems made
available to a directory
SSA-200-2.6 31/44
6.5.3 ISASecure SSA specific requirements
This sub section lists additional scheme specific requirements related to clause 7 Process requirements in
[ISO/IEC 17065], beyond those derived from [ISO/IEC 17065] together with the other documents o f the
ISASecure SSA certification scheme.
6.5.3.1 Application
6.5.3.2 Evaluation
ISO/IEC 17025 5.4.2 on selection of test methods, specifies using the latest version of the standards upon
which tests are based. The latest versions of ISASecure specifications SHALL be identified on the ISASecure
web site at http://www.ISASecure.org.
SSA-200-2.6 32/44
Requirement SSA.R20 – Monitoring essential functions as non-standard test methods
ISO/IEC 17025 5.4.4 and 5.4.5 discuss the definition of procedures for and validation of non -standard test
methods. The test methods and criteria for monitoring upward essential functions for SRT are non-standard
test methods that are agreed with each c ertification applicant before the start of SRT ([SSA-310],
Requirement SRT.R21). They SHALL be subject to the requirements in these ISO/IEC 17025 sub clauses. An
unambiguous description of any non-standard test method used SHALL be documented or referenced in the
test report.
Detailed reporting on SRT results for a system SHALL be carried out in accordance with the requirements on
SRT reporting in all technical specifications for SRT, which are in the normative references for [SSA-300]. If
a CRT laboratory has carried out CRT, some of this information will come from the CRT evidence
submission. The chartered laboratory’s report SHALL note this source for the information.
A chartered laboratory SHALL accept evidence for CRT tests on an embedded device, from a recognized
CRT laboratory, toward certification of a system which includes that device. The chartered laboratory SHALL
define processes for appropriate due diligence on the compliance of this evidence with ISASecure SSA
requirements. Before accepting a CRT evidence submission from a CRT laboratory, the chartered laboratory
SHALL verify that this organization is currently recognized as such by ISCI. Such submissions SHALL be
accepted from a recognized CRT laboratory only and not from a device supplier. Such submissions MAY
apply only for embedded device CRT.
The chartered laboratory SHALL verify that a CRT evidence submission from a CRT laboratory meet s the
requirements laid out in [EDSA-206]. In particular There are some tests in Clause 7 of the CRT test
specifications for individual protocols, where the “Result” is NOT designated as simply pass/fail. Some of
these tests require supplier documentation of risks depending upon the result of the test. The chartered
laboratory SHALL verify that this documentation is present if required. The same requirements SHALL apply
whether the testing supports an initial or subsequent CRT evaluation of the device.
Requirement SSA.R26 – Verification of test outcomes for evidence from CRT laboratory
The chartered laboratory SHALL verify that a CRT evidence submission from a CRT laboratory is consistent
with passing CRT. If not, it may request clarification from the CRT laboratory. The chartered laboratory
SHALL have the responsibility to determine whether the test evidence submitted supports a decision to
SSA-200-2.6 33/44
certify the system of which the device is a component . If a submission or some aspects of a submission are
not accepted, the chartered laboratory SHALL provide a written rationale to the CRT laboratory.
When CRT evidence is submitted by a CRT laboratory to a chartered laboratory toward certification of a
system that includes the device, the chartered laboratory SHALL verify that:
• The CRT tool version reported by the CRT laboratory is recognized for CRT by ISCI
• The CRT specification versions reported by the CRT laboratory match the latest versions on the
ISASecure web site
• The device version in the CRT evidence submission is the same version of the device that has been
submitted by the supplier as a component of the system for performanc e of the other elements of the SSA
evaluation.
If the device version in the CRT report differs from the version submitted to the chartered laboratory under
the SSA certification, the chartered laboratory MAY perform an evidence impact analysis to determine
whether the evidence submitted is applicable for the revised device, per the requirements in [EDSA -301]. The
chartered laboratory SHALL have the option to require the revised device to undergo CRT tests if indicated
per [EDSA-301] requirements.
The requirement in 4.2.1 of ISO/IEC 17025 for adequate documentation of procedures , instructions, etc. is
interpreted as follows for CRT.
Laboratory documentation that provides guidance for SRT SHALL provide sufficient detail to ensure
compliance with the requirements of [SSA-310], when used in conjunction with a recognized CRT tool and
the Nessus tool, which are used for the CRT/NST and VIT sub elements of SRT, respectively .
SSA-200-2.6 34/44
Requirement SSA.R31 – Content of test or assessment data sheet
Each test or assessment data sheet or similar document SHALL include the test or assessment procedure
and specification used, date of the test or assessment, test or assessment report number, signature of the
personnel performing the test or assessment, and test or assessment results. In addition, test data sheets
shall include the product or component tested and test equipment used.
• Identify personnel responsible for preparation, review of technical content, and initial or revision
approval;
The [ISO/IEC 17065] requirement 7.8 refers to certification information to be published in a directory of
certifications granted by the certification body.
6.5.3.4 Surveillance
The ISASecure SSA certification scheme does not require surveillance. A certification of a specific product
version to a specific ISASecure certification version remains in place indefinitely. ISCI does not require a
chartered laboratory to verify periodically that systems shipped by the supplier that are labeled with the
SSA-200-2.6 35/44
version number that has been certified, are in fact that version. However, ISO/IEC 17065 requires that the
chartered laboratory monitor the use of the ISASecure symbol. This includes proper symbol use as it relates
to product version. Certification of updated product versions and certification to updated ISASecure versions
are covered in [SSA-301].
The [ISO/IEC 17065] requirement 7.10.2 in sub clause 7.10 Changes affecting certification, refers to
certification body actions required by the scheme when certification criteria change. Under the requirements
in [SSA-301], no action is required. This is due to the fa ct that certification of a specific product version to a
specific ISASecure certification version remains in place indefinitely, and the product supplier is not required
to obtain a certification to a later ISASecure version.
The [ISO/IEC 17065] sub clause 7.11 refers to termination, reduction, suspension , or withdrawal of
certification. Termination, reduction and suspension are not defined for SSA certification. The following
requirements apply to withdrawal.
The following requirement defines actions as referenced in [ISO/IEC 17065] sub clause 7.11.3, that are
required by the scheme upon termination, reduction, suspension or withdrawal.
The [ISO/IEC 17065] requirement 7.13.1 under 7.13 Complaints and appeals, refers to the certification body
process related to complaints and appeals.
A chartered laboratory SHALL be responsible for managing the resolution of complaints related to any aspect
of compliance for a product it evaluated or certified, including complaints related to compliance with CRT
where these tests were performed by a CRT lab oratory and results submitted to the chartered laboratory. If
the chartered laboratory receives a complaint related to CRT where these tests were performed by a CRT
laboratory, the chartered laboratory SHALL inform the CRT laboratory and engage their assistance toward
resolution where appropriate.
SSA-200-2.6 36/44
Requirement SSA.R42 – Escalation for complaints and appeals related to application of specifications
An appealed complaint MAY request a ruling on whether the ISASecure specifications were correctly applied
in a specific instance. Such a complaint SHALL NOT be escalated to the ASCI board of directors, but is
resolved within ISCI. This ruling could impact:
• Whether the certification process is applicable to a particular product that has applied for certification;
• Adequacy of the product evaluation process by the chartered laboratory or CRT laboratory.
NOTE ISCI or ASCI does not accept certification applications, nor process, grant, or revoke certifications. This is the role of a
chartered laboratory. ISCI can assist in interpretation of the ISASecu re specifications.
6.6.1 Overview
Clause 8 Management system requirements in [ISO/IEC 17065] covers the following topics in associated sub
clauses. Sub clause 8.1 describes two options open to certification bodies to meet the ISO/ IEC 17065
management system requirements. Option A is the option for a certification body to comply with the
management system requirements listed in sub clauses 8.2 -8.8 of [ISO/IEC 17065]. Option B is the option for
a certification body to comply with ISO 9001 requirements. Option B does not require that the certification
body be certified to ISO 9001.
• Options (8.1)
This sub section lists additional scheme specific requirements related to clause 8 Management system
requirements in [ISO/IEC 17065], beyond those derived from [ISO/IEC 17065] together with the other
documents of the ISASecure SSA certification scheme. They apply whether the chartered laboratory elects
Option A or Option B to fulfill the management system requirements.
SSA-200-2.6 37/44
6.6.3.1 General management system documentation
• Identify the personnel responsible for quality, other general and the specific responsibilities for
quality, and the authority delegated to each activity;
SSA-200-2.6 38/44
6.6.3.5 Internal audits
The intent of the following broader provision is to improve the ISASecure product certification programs.
Accreditation of a chartered laboratory involves an assessment of the organization against the requirements
in the following documents:
SSA-200-2.6 39/44
• Section 6 of this document, all ISASecure specific requirements subsections
Technical readiness assessment is based upon review of documented laboratory processes and procedures
as well as review of artifacts produced by the chartered laboratory from sample SDA-S, FSA-S, FSA-E, and
SRT audits carried out by the laboratory on a system, as described in Section 7.3. The review of artifacts
may take place during the pilot phase of the ISASecure SSA program and be related to an early certification
performed by the laboratory.
To be recognized as a chartered laboratory for the ISASecure SSA program, a laboratory shall attain the
following accreditations, performed by an IAF/ILAC recognized accreditation body:
• accredited to ISO/IEC 17065, with technology scope of accreditation covering ISASecure SSA
certification; and
• accredited to ISO/IEC 17025, with technology scope of accreditation covering testing to ISASecure
SSA SRT specifications.
Provisional chartered laboratory status allows an organization to begin certification activities before
accreditation has been formally granted by the accreditation body. Formal granting of the accreditation can
occur several months after the evaluation of the laboratory has taken place and results submitted by the
evaluators to the board within the SSA accreditation body that makes the final accreditation decision.
ASCI will grant a laboratory provisional chartered status based on the results of an evaluation of the
laboratory by a qualified assessor for the ISO/IEC 17025 and ISO/IEC17065 accreditations listed in Section
7.1. Provisional chartered status is granted if the evaluation shows that the laboratory complies with all of
the requirements in the documents listed in Section 7.1, as well as those technical readiness criteria in Table
9 that may be verified based upon process and procedure documentation evidence . These criteria are in
rows 1-8 and 11 of Table 9. All ISASecure specific requirements in Section 6 of this document are also
mandatory to receive provisional chartered status.
The evaluation for a candidate chartered laboratory is performed by an assessor that has been qualified by
an IAF/ILAC recognized accreditation body. A candidate organization shall apply for accreditation as required
by the accreditation body. [ISASecure-202] provides the ASCI application process and forms for provisional
chartered laboratory status based on the evaluation by the accreditation body. “Provisional” chartered
laboratory status is a term applied by ASCI/ISCI within the ISASecure SSA program and is not recognized or
managed by the accreditation body.
During the period when a chartered laboratory is operating in provisional status, ASC I shall be made aware
of the laboratory’s expectations for receipt of formal internationally recognized accreditation by an IAF/ILAC
organization. ASCI shall have the option to perform an interim review and update its evaluation for
provisional status of the chartered laboratory 6 months after it is received. Once a chartered laboratory has
achieved accreditation by an IEC 17011 accreditation body, that accreditation body determines the
requirements and frequency for maintenance audits to maintain accredited status.
The technical readiness assessment reviews technical criteria required for competent performance of the
various ISASecure SSA certification elements . The evaluation consists of assessment of evidence supplied
by the candidate laboratory per the evaluation criteria in Table 9. The requirements numbered UDP.Rnn in
SSA-200-2.6 40/44
this table are from [EDSA-405]. The requirements numbered ERT.Rnn are from [EDSA-310]. The
requirements numbered SRT.Rnn are from [SSA-310].
1 Vendor statement of test tools • Appropriate tool is in place for asset discovery testing
and versions in use for SRT
• Tool and version for CRT/NST robustness tests is recognized
by ISCI
2 Asset discovery testing and • Comply with requirement for certifying scalable systems, that all
CRT processes/procedures certification testing is performed on a reference system that
meets requirements of ISASecure_SY.R3 in [SSA-300]
• Comply with SRT.R48 (ERT.R43) for traffic rate for CRT load
testing and NST
SSA-200-2.6 41/44
ID Evidence supplied by Evaluation criteria
candidate laboratory
seed value if used
3 NST processes/procedures • Comply with SRT.R54 (ERT.R43) for traffic rate for NST
SSA-200-2.6 42/44
ID Evidence supplied by Evaluation criteria
candidate laboratory
protocol specific specification
to a portion of the SRT NST
test procedure
8 Application form and • Application requests all items required per [SSA-300] Section
instructions to be given to 5.2 and [SSA-310] Sections 6.2 and 8
supplier submitting the system
9 Intermediate artifacts, • Test plan complies with SRT.R16-17 in specifying types of tests
paperwork and final evaluation and test points and test order
report for a sample system
covering SDA-S, FSA-S, FSA- • Scope and results of FSA-S evaluation are consistent with
E, and SRT. Artifacts from security zone certification levels and cover system layouts to be
candidate laboratory include certified
procedure for non-standard
tests created for the sample • Scope, artifacts and results from SDA-S are consistent with
system to monitor upward security zone certification levels and validation activities in
essential functions per [SDLA-312], where these differ by level
ISO/IEC 17025 5.4.4 and
validation of these tests per • Scope, artifacts and results from SDA-S take into account all
5.4.5. system layouts in scope for the certification
• Report from VIT evaluation indicates use of tool version and set
of known vulnerabilities specified by [SSA-420]
SSA-200-2.6 43/44
ID Evidence supplied by Evaluation criteria
candidate laboratory
10 Evidence demonstrating that • Verify that steps for creation of reproduced result s required only
asset discovery testing result, information in the evaluation report; and that results are same
CRT result, NST result and VIT as initial results
result for sample system can
be reproduced based on
information in evaluation
report; document steps used to
reproduce these
11 CRT lab interface • Verify that the requirements in 6.5.3.2.2 are reflected in the
chartered laboratory processes and procedures.
——————
SSA-200-2.6 44/44