AN12660
AN12660
TM
Ease ISA/IEC 62443 compliance with EdgeLock SE05x
Rev. 1.1 — 7 December 2020 Application note
582810
Document information
Information Content
Keywords ISA/IEC 62443, Industrial security, EdgeLock SE05x
Abstract This document elaborates on the use of EdgeLock SE05x features to reduce
implementation complexity and to fulfill the security requirements mandated
by the ISA/IEC 62443-4-2 standard.
NXP Semiconductors
AN12660
TM
Ease ISA/IEC 62443 compliance with EdgeLock SE05x
Revision history
Revision history
Revision Date Description
number
1.0 2020-06-16 Initial version
1.1 2020-12-07 Updated to latest template and fixed broken URLs
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
1 Introduction
The potential risk from cyberattacks increases as the number of connected controllers,
machines, devices and sensors keeps growing. As such, security proves itself as a
critical element in the development of industrial control systems against intentional or
unintentional threats. These threats may include personal injury, equipment damage,
supply chain downtime, environmental impact, loss of production or violation of regulatory
requirements, among others.
The industry has responded to cybersecurity threats by creating standards to assist end-
users and equipment vendors through the process of securing industrial control systems.
In this respect, the ISA/IEC 62443 series of standards addresses the security of Industrial
Automation and Control Systems (IACS) throughout their lifecycle.
With ISA/IEC 62443 certification, OEMs demonstrate that their systems or products have
been independently evaluated to ensure that they are free from known vulnerabilities and
have a robust architecture for protection against cyber attacks. In addition, it provides
assurance and confidence to end-users that products comply with higher standards for
employee safety.
As part of the ISA/IEC 62443 standard, four security levels (SL1, SL2, SL3 and SL4)
are defined, each of which represents an incremental level in terms of cybersecurity
measures and in the requirements to be met. In this context, the use of a Secure Element
(SE) such as EdgeLock SE05x with its pre-integrated security features eases the
compliance with ISA/IEC 62443 component requirements and it allows the OEM to
strengthen even more the IoT device against logical and physical attacks, making the
device future-proof.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
To assess and classify the required protection level, the ISA/IEC 62443 standard defines
the concept of security assurance levels. These security levels are connected to risk and
asset value and are organized in tiers, each one requiring more stringent measures to be
put in place, as detailed in Table 1:
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Security Levels 1 and 2 correspond to threats originating from either insiders or intruders
with low skills and motivation. On the other hand, Security Levels 3 and 4 are related
to threats from “professional” cyber criminals, industrial espionage or state-sponsored
malicious actors that demonstrate high skills and moderate to high motivation.
The ISA/IEC 62443 standard establishes a practical guide on how to implement
protective measures against cybersecurity incidents based on the defined security levels,
grouped into seven foundational requirements:
• FR1: Identification and Authentication Control (IAC)
• FR2: Use Control (UC)
• FR3: System Integrity (SI)
• FR4: Data Confidentiality (DC)
• FR5: Restricted Data Flow (RDF)
• FR6: Timely Response to Events (TRE)
• FR7: Resource Availability (RA)
Each foundational requirement (FR) defines specific security requirements depending on
component type, scope and applicability. The requirements that apply indifferently to all
component types are denoted as Component Requirements (CR). In case a requirement
applies only to a specific component type, the requirement is denoted as Embedded
Device Requirement (EDR), Network Device Requirement (NDR), Software Application
Requirement (SAR) or Host Device Requirement (HDR) accordingly.
Table 2 details the component types defined in ISA/IEC 62443 standard.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
As a conclusion, the ISA/IEC 62443 standard provides a point of reference for all
the actors participating in the IACS ecosystem to improve cybersecurity in industrial
environments. On this basis, OEMs and manufacturers can implement the protective
measures to comply with the necessary requirements to achieve the target security level.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Note: In the scope of ISA/IEC 62443-4-2 standard, the focus is on the component level
and the security features to be implemented at the IoT device level. Further elements in
industrial control systems are not considered.
EdgeLock SE05x offers a trusted, highly secure environment where critical keys and
credentials can be stored securely and where built-in cryptographic operations using
secure cryptographic algorithms can be performed.
EdgeLock SE05x simplifies the implementation of security features in industrial system
components since it allows to outsource to a single chip many of those security-related
operations that would otherwise require a complex software implementation. In this
respect, EdgeLock SE05x comes with a pre-installed IoT applet offering advanced
key management and cryptographic functions. To ease the integration of the applet
functionalities in the IoT solution, EdgeLock SE05x even provides a fully-featured
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Table 4. ISA/IEC 62443-4-2 requirements supported by SP1 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
CR 1.5.1 Hardware security for authenticators - - X X
CR 1.9.1 Hardware security for public key-based - - X X
authentication
CR 1.14.1 Hardware security for symmetric key-based - - X X
authentication
CR 3.4.2 Automated notification of integrity violations - - X X
EDR/NDR Physical tamper resistance and detection - X X X
3.11.0
EDR/NDR Notification of a tampering attempt - - X X
3.11.1
EdgeLock SE05x inherently supports the ISA/IEC 62443 requirement EDR/NDR 3.11.0
with its integrated tamper protections certified up to the OS level at CC EAL 6+ including
AVA_VAN 5, the highest achievable level in vulnerability analysis and penetration testing.
Additionally, application developers can leverage EdgeLock SE05x tamper reaction
features to easily fulfil CR 3.4.2 and 3.11.1. Finally, if authenticator keys are stored inside
the EdgeLock SE05x key store, the requirements CR 1.5.1, CR 1.9.1 and CR 1.14.1 are
inherently fulfilled (and certified). In this context, EdgeLock SE05x ensures that long-
lived credentials are kept safe during the device lifecycle, even if an attacker has physical
access to the device. Cryptographic operations are always performed inside EdgeLock
SE05x with the keys remaining in the secure environment.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Table 6. ISA/IEC 62443-4-2 requirements supported by SP3 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
CR 7.3.1 Backup integrity verification - X X X
Table 7. ISA/IEC 62443-4-2 requirements supported by SP4 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
CR 1.5.1 Hardware security for authenticators - - X X
CR 4.1.0 Information confidentiality X X X X
at rest. If encryption keys are stored inside the EdgeLock SE05x key store, CR 1.5.1
is fulfilled and certified. In fact, EdgeLock SE05x ensures that long-lived credentials
are kept safe during the device lifecycle, even if an attacker has physical access to the
device. Cryptographic operations are always performed inside EdgeLock SE05x with the
keys remaining in the secure environment.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Table 8. ISA/IEC 62443-4-2 requirements supported by SP5 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
EDR/NDR Provisioning product supplier roots of trust - X X X
3.12
EDR/NDR Provisioning asset owner roots of trust - X X X
3.13
CR 4.2.0 Information persistence - X X X
EdgeLock SE05x supports the ISA/IEC 62443 requirements EDR/NDR 3.12 and EDR/
NDR 3.13 by providing pre-provisioned credentials injected in NXP's secure facilities.
Such credentials can be used as the root of trust to support a wide variety of use
cases. EdgeLock SE05x also allows the customer to provision a custom root of trust.
Additionally, EdgeLock SE05x helps achieving CR 4.2.0 since it prevents by design
the extraction of private data, such as private keys, stored inside the SE. It also allows
the user to erase the data that has been created or to set policies to restrict or disable
access to stored data.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Table 9. ISA/IEC 62443-4-2 requirements supported by SP6 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
CR 2.12.0 Non-repudiation X X X X
CR 3.1.0 Communication integrity X X X X
CR 3.1.1 Communication authentication - X X X
CR 4.3.0 Use of cryptography X X X X
Table 10. ISA/IEC 62443-4-2 requirements supported by SP7 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
EDR 3.12 Provisioning product supplier roots of trust - X X X
EDR 3.13 Provisioning asset owner roots of trust - X X X
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
EdgeLock SE05x supports the ISA/IEC 62443 requirements EDR 3.12 and EDR 3.13
by providing pre-provisioned credentials injected in NXP's secure facilities. Additionally,
EdgeLock SE05x supports EDR 3.13 by allowing customers to easily provision their own
custom root of trust in case they have their own secure programming facilities.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Table 11. ISA/IEC 62443-4-2 requirements supported by SP8 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
CR 1.8.0 Public key infrastructure certificates - X X X
CR 3.1.0 Communication integrity X X X X
CR 3.1.1 Communication authentication - X X X
CR 3.8.0 Session integrity - X X X
CR 4.3.0 Use of cryptography X X X X
Table 12. ISA/IEC 62443-4-2 requirements supported by SP9 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
CR 3.4.0 Software and information integrity X X X X
EDR/NDR Update authenticity and integrity - X X X
3.10.1
EDR/NDR Integrity of boot process X X X X
3.14.0
EDR/NDR Authenticity of the boot process - X X X
3.14.1
EdgeLock SE05x supports EDR/NDR 3.14.1 and EDR/NDR 3.10.1 since it provides
a secure environment to store public keys that can be used to verify the signature of
applications, boot loaders and update packages before they are loaded and executed.
EdgeLock SE05x supports CR 3.4.0 and EDR/NDR 3.14.0 by providing cryptographic
hash functions that can be used to compute the digests of software applications that are
going to be executed and compare them with pre-computed, signed digests to check
integrity.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Table 13. ISA/IEC 62443-4-2 requirements supported by SP10 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
CR 2.12.0 Non-repudiation X X X X
CR 2.12.1 Non-repudiation for all users - - - X
CR 3.9.0 Protection of audit information - X X X
SE. You can refer to the Secure Provisioning and Decommissioning security primitive for
more information.
The EdgeLock SE05x Plug&Trust Middleware API can be used to simplify the integration
of the abovementioned use cases in your IoT solution. The main EdgeLock SE05x
Plug&Trust Middleware API functions supporting the core use cases of this security
primitive are listed below:
• Encrypt/decrypt data at rest: sss_se05x_asymmetric_encrypt (),
sss_se05x_asymmetric_decrypt (), sss_se05x_cipher_one_go ()
The EdgeLock SE05x Plug&Trust Middleware also provides a set of demos and code
examples that might be useful to implement the use cases supported by the Secure
(Encrypted) Storage security primitive. The relevant examples, along with their location in
EdgeLock SE05x Plug&Trust Middleware folder structure, are shown below:
• Symmetric AES Encryption Example: \simw-top\sss\ex\symmetric (see Section 5.2.3
of EdgeLock SE05x Plug&Trust Middleware documentation)
Leveraging the encryption and tamper resistance capabilities of EdgeLock SE05x aids in
achieving the ISA/IEC 62443-4-2 requirements listed in Table 14 to the highest security
level.
Table 14. Requirements supported by SP11 and benefiting from EdgeLock SE05x
Code Requirement SL1 SL2 SL3 SL4
CR 4.1.0 Information confidentiality X X X X
CR 4.2.0 Information persistence - X X X
CR 4.3.0 Use of cryptography X X X X
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Plug&Trust Middleware API functions supporting the core use cases of this security
primitive are listed below:
• Key creation: sss_se05x_key_store_generate_key ()
• Key import / injection: sss_key_store_set_key(), Se05x_API_WriteECKey (),
Se05x_API_WriteRSAKey (), Se05x_API_WriteSymmKey ()
• Key agreement: sss_derive_key_dh ()
• Key derivation: , sss_derive_key_one_go ()
The EdgeLock SE05x Plug&Trust Middleware also provides a set of demos and
code examples that might be useful to implement the use cases supported by the
Cryptographic Key Generation and Injection security primitive. The relevant examples,
along with their location in EdgeLock SE05x Plug&Trust Middleware folder structure, are
shown below:
• Symmetric AES Encryption Example (key generation):: \simw-top\sss\ex\symmetric
(see Section 5.2.3 of EdgeLock SE05x Plug&Trust Middleware documentation)
• ECC Signing Example (key generation): \simw-top\sss\ex\ecc (see Section 5.2.1 of
EdgeLock SE05x Plug&Trust Middleware documentation)
• RSA Signing Example (key generation): \simw-top\sss\ex\rsa (see Section 5.2.2 of
EdgeLock SE05x Plug&Trust Middleware documentation)
• ECDH Key Derivation Example: \simw-top\sss\ex\ecdh (see Section 5.2.7 of
EdgeLock SE05x Plug&Trust Middleware documentation)
Leveraging key generation and key derivation capabilities provided by EdgeLock SE05x
aids in achieving ISA/IEC 62443 4-2 compliance for the requirements listed in Table 15 at
the highest security levels.
Table 15. Requirements supported by SP12 and benefiting from EdgeLock SE05x
Code Requirement SL1 SL2 SL3 SL4
CR 1.5.0 Authenticator management X X X X
CR 1.5.1 Hardware security for authenticators - - X X
CR 1.8.0 Public key infrastructure certificates - X X X
CR 4.3.0 Use of cryptography X X X X
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Key generation capabilities are covered in Cryptographic Key Generation and Injection
security primitive. EdgeLock SE05x also supports access management to credentials
in the form of policies that can be used to specify the operations allowed on a given
credential. EdgeLock SE05x policies can be used, for example, to define if a key can be
used for encryption, for signing or both and if a key is read-only or if it can be exported or
deleted.
The EdgeLock SE05x Plug&Trust Middleware API can be used to simplify the integration
of the abovementioned use cases in the IoT solution. The main EdgeLock SE05x
Plug&Trust Middleware API functions supporting the core use cases of this security
primitive are listed below:
• Set policy upon object creation / injection: sss_se05x_key_store_generate_key (),
sss_se05x_key_store_set_key ()
• Update policy upon object update: sss_se05x_key_store_set_key ()
The EdgeLock SE05x Plug&Trust Middleware also provides a set of demos and
code examples that might be useful to implement the use cases supported by the
Cryptographic Key and Certificate Store security primitive. The relevant examples, along
with their location in EdgeLock SE05x Plug&Trust Middleware folder structure, are shown
below:
• Using policies for secure objects demo: \simw-top\demos\se05x\se05x_policy (see
Section 5.17 of EdgeLock SE05x Plug&Trust Middleware documentation)
Leveraging tamper resistance capabilities and key management functions provided by
EdgeLock SE05x aids in achieving ISA/IEC 62443 4-2 compliance for the requirements
listed in Table 16 at the highest security levels.
Table 16. ISA/IEC 62443-4-2 requirements supported by SP13 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
CR 1.5.1 Hardware security for authenticators - - X X
CR 1.9.1 Hardware security for public key-based - - X X
authentication
CR 1.14.1 Hardware security for symmetric key-based - - X X
authentication
EdgeLock SE05x inherently supports CR 1.5.1, CR 1.9.1 and CR 1.14.1 since it provides
a certified hardware with strong tamper-resistant protection for keys stored in the SE.
EdgeLock SE05x supports both symmetric and asymmetric keys. EdgeLock SE05x also
comes with advanced key management functionalities that allow the user to set policies
on key objects to restrict the set of permitted operations on them.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
(DES, AES), public-key encryption algorithms using either RSA or ECC with support for
NIST, Brainpool, Edwards and Montgomery curves, public-key signing algorithms (RSA,
ECDSA, ECDAA, EdDSA), key agreement algorithms (ECDH, ECDHE) and hashing and
MAC algorithms (SHA, HMAC, CMAC). For a detailed list of supported algorithms you
can refer to EdgeLock SE05x Data Sheet.
The EdgeLock SE05x Plug&Trust Middleware API can be used to simplify the integration
of the abovementioned use cases in the IoT solution. The main EdgeLock SE05x
Plug&Trust Middleware API functions supporting the core use cases of this security
primitive are listed below:
• Encryption and decryption operations: sss_asymmetric_encrypt(),
sss_asymmetric_decrypt(), sss_cipher_one_go()
• Hashing operations: sss_se05x_digest_one_go (), Se05x_API_DigestOneShot()
• MAC operations: sss_se05x_mac_one_go ()
• Sign and verify operations: sss_se05x_asymmetric_sign_digest (),
sss_se05x_asymmetric_verify_digest (), sss_se05x_asymmetric_sign (),
sss_se05x_asymmetric_verify (), Se05x_API_RSASign(), Se05x_API_ECDSASign(),
Se05x_API_EdDSASign()
• Derive key operations: sss_se05x_derive_key_go ()
• Key agreement operations: sss_se05x_derive_key_dh ()
The EdgeLock SE05x Plug&Trust Middleware also provides a set of demos and
code examples that might be useful to implement the use cases supported by the
Cryptographic Operation security primitive. The relevant examples, along with their
location in EdgeLock SE05x Plug&Trust Middleware folder structure, are shown below:
• Symmetric AES Encryption Example: \simw-top\sss\ex\symmetric (see Section 5.2.3
of EdgeLock SE05x Plug&Trust Middleware documentation)
• Message Digest Example: \simw-top\sss\ex\md (see Section 5.2.5 of EdgeLock
SE05x Plug&Trust Middleware documentation)
• HMAC Example: \simw-top\sss\ex\hmac (see Section 5.2.6 of EdgeLock SE05x
Plug&Trust Middleware documentation)
• ECC Signing Example: \simw-top\sss\ex\ecc (see Section 5.2.1 of EdgeLock SE05x
Plug&Trust Middleware documentation)
• RSA Signing Example: \simw-top\sss\ex\rsa (see Section 5.2.2 of EdgeLock SE05x
Plug&Trust Middleware documentation)
• ECDH Key Derivation Example: \simw-top\sss\ex\ecdh (see Section 5.2.7 of
EdgeLock SE05x Plug&Trust Middleware documentation)
EdgeLock SE05x aids in achieving ISA/IEC 62443 4-2 compliance for the requirements
listed in Table 17 at the highest security levels.
Table 17. ISA/IEC 62443-4-2 requirements supported by SP14 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
CR 1.8.0 Public key infrastructure certificates - X X X
CR 1.9.0 Strength of public key-based authentication - X X X
CR 1.14.0 Strength of symmetric key-based authentication - X X X
CR 3.1.0 Communication integrity X X X X
CR 3.1.1 Communication authentication - X X X
CR 3.4.0 Software and information integrity X X X X
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Table 17. ISA/IEC 62443-4-2 requirements supported by SP14 and benefiting from EdgeLock
SE05x...continued
Code Requirement SL1 SL2 SL3 SL4
CR 3.4.1 Authenticity of software and information - X X X
CR 3.8.0 Session integrity - X X X
CR 3.9.0 Protection of audit information - X X X
CR 3.14.0 Integrity of boot process X X X X
CR 3.14.1 Authenticity of boot process - X X X
CR 4.1.0 Information confidentiality X X X X
CR 4.3.0 Use of cryptography X X X X
CR 7.3.1 Backup integrity verification - X X X
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Table 18. ISA/IEC 62443-4-2 requirements supported by SP15 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
EDR/NDR Provisioning product supplier roots of trust - X X X
3.12
EDR/NDR Provisioning asset owner roots of trust - X X X
3.13
EdgeLock SE05x supports the ISA/IEC 62443 requirements EDR/NDR 3.12 and EDR/
NDR 3.13 by providing pre-provisioned keys and certificates that can be used for cloud
onboarding in all major cloud platforms.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Table 19. ISA/IEC 62443-4-2 requirements supported by SP16 and benefiting from EdgeLock
SE05x
Code Requirement SL1 SL2 SL3 SL4
EDR/NDR Mobile code authenticity check - X X X
2.4.1
CR 3.4.0 Software and information integrity X X X X
CR 3.4.1 Authenticity of software and information - X X X
CR 3.4.2 Automated notification of integrity violations - - X X
EDR/NDR Update authenticity and integrity - X X X
3.10.1
EDR/NDR Provisioning product supplier roots of trust - X X X
3.12.0
EDR/NDR Provisioning asset owner roots of trust - X X X
3.13.0
EdgeLock SE05x supports EDR/NDR 3.12.0 and EDR/NDR 3.13.0 since it allows the
user to securely provision key-pairs and certificates that can be used to provide a root of
trust for different entities involved in the management and production of the IoT device.
EdgeLock SE05x also helps achieving EDR/NDR 2.4.1, CR 3.4.0, CR 3.4.1 and EDR/
NDR 3.10.1 since the established root of trust can be used to verify the authenticity
of software and updates before they are executed. Pre-computed, signed hashes can
be used to verify the integrity of the executed software. Finally, thanks to its tamper-
detection capabilities, EdgeLock SE05x can be used in combination with IoT applications
to send alerts in case of tampering attempts and in this way fulfil CR 3.4.2 as described
in Anomaly Detection and Reaction security primitive.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Table 20. ISA/IEC 62443-4-2 requirements and security primitives lookup table
FR Req. Description Security primitives
FR1 CR 1.2.0 Software process and device SP2: Device attestation
identification
CR 1.2.1 Unique identification and authentication SP2: Device attestation
CR 1.5.0 Authenticator management SP12: Cryptographic Key Generation and Injection
CR 1.5.1 Hardware security for authenticators SP1: Anomaly detection and reaction
SP4: Protection of personal information
SP12: Cryptographic Key Generation and Injection
SP13: Cryptographic Key and Certificate Store
CR 1.8.0 Public key infrastructure certificates SP8: Secure Communication Protocols
SP12: Cryptographic Key Generation and Injection
SP14: Cryptographic Operation
CR 1.9.0 Strength of public key-based SP14: Cryptographic Operation
authentication
CR 1.9.1 Hardware security for public key based SP1: Anomaly detection and reaction
authentication SP13: Cryptographic Key and Certificate Store
CR 1.14.0 Strength of symmetric key based SP14: Cryptographic Operation
authentication
CR 1.14.1 Hardware security for symmetric key SP1: Anomaly detection and reaction
based authentication SP13: Cryptographic Key and Certificate Store
FR2 NDR/SAR Mobile code authenticity check SP16: Secure Updates
2.4.1
CR 2.12.0 Non-repudiation SP6: Cryptographic random number generation
SP10: System Event Logging
CR 2.12.1 Non-repudiation for all users SP10: System Event Logging
FR3 CR 3.1.0 Communication integrity SP6: Cryptographic random number generation
SP8: Secure Communication Protocols
SP14: Cryptographic Operation
CR 3.1.1 Communication authentication SP6: Cryptographic random number generation
SP8: Secure Communication Protocols
SP14: Cryptographic Operation
CR 3.4.0 Software and information integrity SP9: Secure Initialization
SP14: Cryptographic Operation
SP16: Secure Updates
CR 3.4.1 Authenticity of software and information SP14: Cryptographic Operation
SP16: Secure Updates
CR 3.4.2 Automated notification of integrity SP1: Anomaly detection and reaction
violations SP16: Secure Updates
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Table 20. ISA/IEC 62443-4-2 requirements and security primitives lookup table...continued
FR Req. Description Security primitives
CR 3.8.0 Session integrity SP8: Secure Communication Protocols
SP14: Cryptographic Operation
CR 3.9.0 Protection of audit information SP10: System Event Logging
SP14: Cryptographic Operation
EDR/NDR Update authenticity and integrity SP9: Secure Initialization
3.10.1 SP16: Secure Updates
EDR/NDR Physical tamper resistance and SP1: Anomaly detection and reaction
3.11.0 detection
EDR/NDR Notification of a tampering attempt SP1: Anomaly detection and reaction
3.11.1
EDR/NDR Provisioning product supplier roots of SP5: Secure Provisioning and Decommissioning
3.12.0 trust SP7: Root of Trust
SP15: Secure Onboarding and Offboarding
SP16: Secure Updates
EDR/NDR Provisioning asset owner roots of trust SP5: Secure Provisioning and Decommissioning
3.13.0 SP7: Root of Trust
SP15: Secure Onboarding and Offboarding
SP16: Secure Updates
EDR/NDR Integrity of the boot process SP9: Secure Initialization
3.14.0 SP14: Cryptographic Operation
EDR/NDR Authenticity of the boot process SP9: Secure Initialization
3.14.1 SP14: Cryptographic Operation
FR4 CR 4.1.0 Information confidentiality SP4: Protection of personal information
SP11: Secure Encrypted Storage
SP14: Cryptographic Operation
CR 4.2.0 Information persistence SP5: Secure Provisioning and Decommissioning
SP11: Secure Encrypted Storage
CR 4.3.0 Use of cryptography SP6: Cryptographic random number generation
SP8: Secure Communication Protocols
SP11: Secure Encrypted Storage
SP12: Cryptographic Key Generation and Injection
SP14: Cryptographic Operation
FR7 CR 7.3.1 Backup integrity verification SP3: Secure backup and recovery
SP14: Cryptographic Operation
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
6 Glossary
Term Definition
AES Advanced Encryption Standard
CR Component Requirement
DES Data Encryption Standard
ECC Elliptic-curve Cryptography
ECDH Elliptic-curve Diffie-Hellman
ECDHE Elliptic-curve Diffie-Hellman Ephemeral
EDR Embedded Device Requirement
FR Foundational Requirement
HDR Host Device Requirement
HTTP Hypertext Transfer Protocol
IoT Internet of Things
KDF Key Derivation Function
MAC Message Authentication Code
MQTT Message Queuing Telemetry Transport
NDR Network Device Requirement
OEM Original Equipment Manufacturer
OS Operating System
PCR Platform Configuration Register
PKI Public Key Infrastructure
PRNG Pseudo Random Number Generator
SAR Software Application Requirement
SCP Secure Channel Protocol
SE Secure Element
SHA Secure Hash Algorithm
SL Security Level
SP Security Primitive
TLS Transport Layer Security
TRNG True Random Number Generator
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
7 Legal information
on any weakness or default in the customer’s applications or products, or
the application or use by customer’s third party customer(s). Customer is
7.1 Definitions responsible for doing all necessary testing for the customer’s applications
and products using NXP Semiconductors products in order to avoid a
Draft — A draft status on a document indicates that the content is still default of the applications and the products or of the application or use by
under internal review and subject to formal approval, which may result customer’s third party customer(s). NXP does not accept any liability in this
in modifications or additions. NXP Semiconductors does not give any respect.
representations or warranties as to the accuracy or completeness of
information included in a draft version of a document and shall have no Export control — This document as well as the item(s) described herein
liability for the consequences of use of such information. may be subject to export control regulations. Export might require a prior
authorization from competent authorities.
Evaluation products — This product is provided on an “as is” and “with all
7.2 Disclaimers faults” basis for evaluation purposes only. NXP Semiconductors, its affiliates
and their suppliers expressly disclaim all warranties, whether express,
implied or statutory, including but not limited to the implied warranties of
Limited warranty and liability — Information in this document is believed
non-infringement, merchantability and fitness for a particular purpose. The
to be accurate and reliable. However, NXP Semiconductors does not
entire risk as to the quality, or arising out of the use or performance, of this
give any representations or warranties, expressed or implied, as to the
product remains with customer. In no event shall NXP Semiconductors, its
accuracy or completeness of such information and shall have no liability
affiliates or their suppliers be liable to customer for any special, indirect,
for the consequences of use of such information. NXP Semiconductors
consequential, punitive or incidental damages (including without limitation
takes no responsibility for the content in this document if provided by an
damages for loss of business, business interruption, loss of use, loss of
information source outside of NXP Semiconductors. In no event shall NXP
data or information, and the like) arising out the use of or inability to use
Semiconductors be liable for any indirect, incidental, punitive, special or
the product, whether or not based on tort (including negligence), strict
consequential damages (including - without limitation - lost profits, lost
liability, breach of contract, breach of warranty or any other theory, even if
savings, business interruption, costs related to the removal or replacement
advised of the possibility of such damages. Notwithstanding any damages
of any products or rework charges) whether or not such damages are based
that customer might incur for any reason whatsoever (including without
on tort (including negligence), warranty, breach of contract or any other
limitation, all damages referenced above and all direct or general damages),
legal theory. Notwithstanding any damages that customer might incur for
the entire liability of NXP Semiconductors, its affiliates and their suppliers
any reason whatsoever, NXP Semiconductors’ aggregate and cumulative
and customer’s exclusive remedy for all of the foregoing shall be limited to
liability towards customer for the products described herein shall be limited
actual damages incurred by customer based on reasonable reliance up to
in accordance with the Terms and conditions of commercial sale of NXP
the greater of the amount actually paid by customer for the product or five
Semiconductors.
dollars (US$5.00). The foregoing limitations, exclusions and disclaimers shall
apply to the maximum extent permitted by applicable law, even if any remedy
Right to make changes — NXP Semiconductors reserves the right to fails of its essential purpose.
make changes to information published in this document, including without
limitation specifications and product descriptions, at any time and without
Translations — A non-English (translated) version of a document is for
notice. This document supersedes and replaces all information supplied prior
reference only. The English version shall prevail in case of any discrepancy
to the publication hereof.
between the translated and English versions.
Suitability for use — NXP Semiconductors products are not designed,
Security — Customer understands that all NXP products may be subject
authorized or warranted to be suitable for use in life support, life-critical or
to unidentified or documented vulnerabilities. Customer is responsible
safety-critical systems or equipment, nor in applications where failure or
for the design and operation of its applications and products throughout
malfunction of an NXP Semiconductors product can reasonably be expected
their lifecycles to reduce the effect of these vulnerabilities on customer’s
to result in personal injury, death or severe property or environmental
applications and products. Customer’s responsibility also extends to other
damage. NXP Semiconductors and its suppliers accept no liability for
open and/or proprietary technologies supported by NXP products for use
inclusion and/or use of NXP Semiconductors products in such equipment or
in customer’s applications. NXP accepts no liability for any vulnerability.
applications and therefore such inclusion and/or use is at the customer’s own
Customer should regularly check security updates from NXP and follow up
risk.
appropriately. Customer shall select products with security features that best
meet rules, regulations, and standards of the intended application and make
Applications — Applications that are described herein for any of these the ultimate design decisions regarding its products and is solely responsible
products are for illustrative purposes only. NXP Semiconductors makes for compliance with all legal, regulatory, and security related requirements
no representation or warranty that such applications will be suitable concerning its products, regardless of any information or support that may
for the specified use without further testing or modification. Customers be provided by NXP. NXP has a Product Security Incident Response Team
are responsible for the design and operation of their applications and (PSIRT) (reachable at PSIRT@nxp.com) that manages the investigation,
products using NXP Semiconductors products, and NXP Semiconductors reporting, and solution release to security vulnerabilities of NXP products.
accepts no liability for any assistance with applications or customer product
design. It is customer’s sole responsibility to determine whether the NXP
Semiconductors product is suitable and fit for the customer’s applications
and products planned, as well as for the planned application and use of
customer’s third party customer(s). Customers should provide appropriate 7.3 Trademarks
design and operating safeguards to minimize the risks associated with
their applications and products. NXP Semiconductors does not accept any Notice: All referenced brands, product names, service names and
liability related to any default, damage, costs or problem which is based trademarks are the property of their respective owners.
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Tables
Tab. 1. ISA/IEC 62443 security assurance levels ..........5 Tab. 12. ISA/IEC 62443-4-2 requirements supported
Tab. 2. Component types .............................................. 6 by SP9 and benefiting from EdgeLock
Tab. 3. Security primitives definition ..............................9 SE05x .............................................................. 19
Tab. 4. ISA/IEC 62443-4-2 requirements supported Tab. 13. ISA/IEC 62443-4-2 requirements supported
by SP1 and benefiting from EdgeLock by SP10 and benefiting from EdgeLock
SE05x .............................................................. 10 SE05x .............................................................. 20
Tab. 5. Requirements eased by SP2 and benefiting Tab. 14. Requirements supported by SP11 and
from EdgeLock SE05x .................................... 11 benefiting from EdgeLock SE05x .................... 21
Tab. 6. ISA/IEC 62443-4-2 requirements supported Tab. 15. Requirements supported by SP12 and
by SP3 and benefiting from EdgeLock benefiting from EdgeLock SE05x .................... 22
SE05x .............................................................. 13 Tab. 16. ISA/IEC 62443-4-2 requirements supported
Tab. 7. ISA/IEC 62443-4-2 requirements supported by SP13 and benefiting from EdgeLock
by SP4 and benefiting from EdgeLock SE05x .............................................................. 23
SE05x .............................................................. 13 Tab. 17. ISA/IEC 62443-4-2 requirements supported
Tab. 8. ISA/IEC 62443-4-2 requirements supported by SP14 and benefiting from EdgeLock
by SP5 and benefiting from EdgeLock SE05x .............................................................. 24
SE05x .............................................................. 15 Tab. 18. ISA/IEC 62443-4-2 requirements supported
Tab. 9. ISA/IEC 62443-4-2 requirements supported by SP15 and benefiting from EdgeLock
by SP6 and benefiting from EdgeLock SE05x .............................................................. 26
SE05x .............................................................. 16 Tab. 19. ISA/IEC 62443-4-2 requirements supported
Tab. 10. ISA/IEC 62443-4-2 requirements supported by SP16 and benefiting from EdgeLock
by SP7 and benefiting from EdgeLock SE05x .............................................................. 27
SE05x .............................................................. 16 Tab. 20. ISA/IEC 62443-4-2 requirements and
Tab. 11. ISA/IEC 62443-4-2 requirements supported security primitives lookup table ....................... 28
by SP8 and benefiting from EdgeLock
SE05x .............................................................. 18
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Figures
Fig. 1. ISA/IEC 62443 overview ................................... 5 Fig. 2. Breakdown of a simplified industrial control
system ............................................................... 8
AN12660 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2020. All rights reserved.
Contents
1 Introduction ......................................................... 3
2 How to use this document ................................. 4
3 ISA/IEC 62443 standard overview ......................5
4 Leverage EdgeLock SE05x to meet ISA/
IEC 62443-4-2 requirements ............................... 8
4.1 SP1: Anomaly detection and reaction ..............10
4.2 SP2: Device attestation ................................... 11
4.3 SP3: Secure backup and recovery .................. 12
4.4 SP4: Protection of personal information .......... 13
4.5 SP5: Secure Provisioning and
Decommissioning .............................................14
4.6 SP6: Cryptographic random number
generation ........................................................ 15
4.7 SP7: Root of Trust ...........................................16
4.8 SP8: Secure Communication Protocols ...........17
4.9 SP9: Secure Initialization .................................18
4.10 SP10: System Event Logging ..........................19
4.11 SP11: Secure Encrypted Storage .................... 20
4.12 SP12: Cryptographic Key Generation and
Injection ............................................................21
4.13 SP13: Cryptographic Key and Certificate
Store ................................................................ 22
4.14 SP14: Cryptographic Operation .......................23
4.15 SP15: Secure Onboarding and Offboarding .... 25
4.16 SP16: Secure Updates .................................... 26
5 ISA/IEC 62443-4-2 requirements lookup
table .................................................................... 28
6 Glossary ............................................................. 30
7 Legal information .............................................. 31
Please be aware that important notices concerning this document and the product(s)
described herein, have been included in section 'Legal information'.