Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Mitigations
  3. Communication Authenticity

Communication Authenticity

When communicating over an untrusted network, utilize secure network protocols that both authenticate the message sender and can verify its integrity. This can be done either through message authentication codes (MACs) or digital signatures, to detect spoofed network messages and unauthorized connections.

ID: M0802
Security Controls: IEC 62443-3-3:2013 - SR 3.1, IEC 62443-4-2:2019 - CR 3.1, NIST SP 800-53 Rev. 5 - SC-8; SC-23
Version: 1.0
Created: 11 September 2020
Last Modified: 16 April 2025
ICS Layer
downloadview

Techniques Addressed by Mitigation

DomainIDNameUse
ICST0800Activate Firmware Update Mode

Protocols used for device management should authenticate all network messages to prevent unauthorized system changes.

ICST0830Adversary-in-the-Middle

Communication authenticity will ensure that any messages tampered with through AiTM can be detected, but cannot prevent eavesdropping on these. In addition, providing communication authenticity around various discovery protocols, such as DNS, can be used to prevent various AiTM procedures.

ICST0858Change Operating Mode

Protocols used for device management should authenticate all network messages to prevent unauthorized system changes.

ICST0868Detect Operating Mode

Protocols used for control functions should provide authenticity through MAC functions or digital signatures. If not, utilize bump-in-the-wire devices or VPNs to enforce communication authenticity between devices that are not capable of supporting this (e.g., legacy controllers, RTUs).

ICST0816Device Restart/Shutdown

Protocols used for control functions should provide authenticity through MAC functions or digital signatures. If not, utilize bump-in-the-wire devices or VPNs to enforce communication authenticity between devices that are not capable of supporting this (e.g., legacy controllers, RTUs).

ICST0831Manipulation of Control

Protocols used for control functions should provide authenticity through MAC functions or digital signatures. If not, utilize bump-in-the-wire devices or VPNs to enforce communication authenticity between devices that are not capable of supporting this (e.g., legacy controllers, RTUs).

ICST0832Manipulation of View

Protocols used for control functions should provide authenticity through MAC functions or digital signatures. If not, utilize bump-in-the-wire devices or VPNs to enforce communication authenticity between devices that are not capable of supporting this (e.g., legacy controllers, RTUs).

ICST0839Module Firmware

Protocols used for device management should authenticate all network messages to prevent unauthorized system changes.

ICST0861Point & Tag Identification

Protocols used for control functions should provide authenticity through MAC functions or digital signatures. If not, utilize bump-in-the-wire devices or VPNs to enforce communication authenticity between devices that are not capable of supporting this (e.g., legacy controllers, RTUs).

ICST0843Program Download

Protocols used for device management should authenticate all network messages to prevent unauthorized system changes.

ICST0845Program Upload

Protocols used for device management should authenticate all network messages to prevent unauthorized system changes.

ICST0848Rogue Master

Protocols used for control functions should provide authenticity through MAC functions or digital signatures. If not, utilize bump-in-the-wire devices or VPNs to enforce communication authenticity between devices that are not capable of supporting this (e.g., legacy controllers, RTUs).

ICST0856Spoof Reporting Message

Protocols used for control functions should provide authenticity through MAC functions or digital signatures. If not, utilize bump-in-the-wire devices or VPNs to enforce communication authenticity between devices that are not capable of supporting this (e.g., legacy controllers, RTUs).

ICST0857System Firmware

Protocols used for device management should authenticate all network messages to prevent unauthorized system changes.

ICST0855Unauthorized Command Message

Protocols used for control functions should provide authenticity through MAC functions or digital signatures. If not, utilize bump-in-the-wire devices or VPNs to enforce communication authenticity between devices that are not capable of supporting this (e.g., legacy controllers, RTUs).

ICST0860Wireless Compromise

Do not inherently rely on the authenticity provided by the network/link layer (e.g., 802.11, LTE, 802.15.4), as link layer equipment may have long lifespans and protocol vulnerabilities may not be easily patched. Provide defense-in-depth by implementing authenticity within the associated application-layer protocol, or through a network-layer VPN.[1] Furthermore, ensure communication schemes provide strong replay protection, employing techniques such as timestamps or cryptographic nonces.

References

×

[8]ページ先頭

©2009-2026 Movatter.jp