The (SDLA) certification ensures that a supplier’s product development organization has institutionalized cybersecurity into their product development and support lifecycle processes and follows them consistently on an ongoing basis. The objective of this certification is to ensure that cybersecurity is designed into IACS products from the beginning and is followed throughout all product development and support lifecycle phases. SDLA is aligned to certify to ISA/IEC 62443-3-1. The SDLA program description and certification specifications are available for download in pdf format from the ISCI website at www.isasecure.org.

Supplier organizations are encouraged to contact an ISASecure-accredited lab for details on how to certify their organizations’ product development and support lifecycle processes. Supplier organizations earning this designation may use the phrase, “An ISASecure SDLA certified development organization,” when describing their certified organizations.

ISCI has been certifying embedded devices under the Embedded Device Security Assurance certification (ISASecure EDSA) scheme since 2010. EDSA, the first ISASecure certification, assures cybersecurity for off-the-shelf embedded devices and lists certified devices from prominent suppliers such as Honeywell and Yokogawa.

The ISASecureTM program has been developed by the ISA Security Compliance Institute (ISCI) with a goal to accelerate industry-wide cybersecurity improvement for IACS. ISASecure certifications are based upon international cybersecurity standards including the ISA/IEC 62443 series, ISO 27001and other relevant industry-consensus standards.

The ISASecure IACS cybersecurity certification program is an ISO/IEC Guide 65 conformance scheme supporting ISCI’s goal to operate a globally recognized IACS cybersecurity certification program. Independent third-party accreditation of ISCI labs by IEC accreditation bodies (AB) such ANSI/ACLASS and JAB ensures the credibility and value of the ISASecure certification by objectively attesting to the competence and qualification of ISCI certification bodies (CB) and laboratories.

About the ISA Security Compliance Institute (ISCI)
Founded as an industry not-for-profit in 2007, the ISA Security Compliance Institute’s mission is to provide the highest level of assurance possible for the cybersecurity of industrial automation control systems (IACS).

The Institute was established by thought leaders from major organizations in the industrial automation controls community seeking to improve the cyber security posture of Critical Infrastructure for generations to come. ISCI Members include Chevron, ExxonMobil, Aramco Services, Honeywell, Invensys (now Schneider Electric), Yokogawa, exida, Codenomicon, CSSC, and IPA-Japan.

The Institute’s goals are realized through industry standards compliance programs, education, technical support, and improvements in suppliers’ development processes and users’ life cycle management practices. The ISASecure® designation ensures that IACS products conform to industry consensus cyber security standards such as IEC 62443, providing confidence to users of ISASecure products and systems and creating product differentiation for suppliers conforming to the ISASecure specification.

www.isasecure.org

ISASecure® is a registered trademark of the ISA Security Compliance Institute.

Upcoming Events

August 9 - August 11 2022

MaximoWorld 2022

View all Events
banner
80% of Reliabilityweb.com newsletter subscribers report finding something used to improve their jobs on a regular basis.
Subscribers get exclusive content. Just released...MRO Best Practices Special Report - a $399 value!
DOWNLOAD NOW
Three Things You Need to Know About Capital Project Prioritization

“Why do you think these two projects rank so much higher in this method than the first method?” the facilitator asked the director of reliability.

What Is Industrial Maintenance as a Service?

Industrial maintenance as a service (#imaas) transfers the digital and/or manual management of maintenance and industrial operations from machine users to machine manufacturers (OEMs), while improving it considerably.

Three Things You Need to Know About Criticality Analysis

When it comes to criticality analysis, there are three key factors must be emphasized.

Turning the Oil Tanker

This article highlights the hidden trap of performance management systems.

Optimizing Value From Physical Assets

There are ever-increasing opportunities to create new and sustainable value in asset-intensive organizations through enhanced use of technology.

Conducting Asset Criticality Assessment for Better Maintenance Strategy and Techniques

Conducting an asset criticality assessment (ACA) is the first step in maintaining the assets properly. This article addresses the best maintenance strategy for assets by using ACA techniques.

Harmonizing PMs

Maintenance reliability is, of course, an essential part of any successful business that wants to remain successful. It includes the three PMs: predictive, preventive and proactive maintenance.

How an Edge IoT Platform Increases Efficiency, Availability and Productivity

Within four years, more than 30 per cent of businesses and organizations will include edge computing in their cloud deployments to address bandwidth bottlenecks, reduce latency, and process data for decision support in real-time.

MaximoWorld 2022

The world's largest conference for IBM Maximo users, IBM Executives, IBM Maximo Partners and Services with Uptime Elements Reliability Framework and Asset Management System is being held Aug 8-11, 2022

6 Signs Your Maintenance Team Needs to Improve Its Safety Culture

When it comes to people and safety in industrial plants, maintenance teams are the ones who are most often in the line of fire and at risk for injury or death.