IEC 62443 is a series of international standards developed by the International Electrotechnical Commission (IEC) that provides a framework for implementing cybersecurity in industrial automation and control systems (IACS). The series comprises of several parts, each of which addresses a specific aspect of IACS cybersecurity.
The standards are designed to provide a systematic approach to IACS security, addressing the entire lifecycle of the system from concept to retirement. This includes defining security requirements, designing secure systems, implementing security controls, and continuously monitoring and improving the security posture of the system.
IEC 62443 provides a comprehensive approach to IACS cybersecurity that takes into account the unique requirements and challenges of these systems. The standards are designed to be flexible and scalable, allowing organizations to tailor their approach to their specific needs and risk profile.
The IEC 62443 series is widely recognized as a leading standard for IACS cybersecurity and is used by organizations around the world to help secure their critical infrastructure.
The IEC 62443 series of standards is organized into four main categories, each of which addresses a different aspect of IACS security.
1.1. IEC 62443-1 General Concepts
The standard provides an introduction to the IEC 62443 series and describes the general concepts and terminology used in IACS security.
1.1.1. IEC 62443-1-1 Terminology, concepts and models
The IEC 62443-1-1 standard provides a common language and conceptual framework for IACS security. It defines terms and concepts used throughout the series and provides a model for understanding the components and interactions of IACS.
Key terms defined in IEC 62443-1-1:
Cybersecurity
The prevention of damage to, protection of, and restoration of systems, networks, and information
Risk
The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
Asset
A resource or component of an organization that has value and requires protection.
Threat
A potential cause of an unwanted incident that may result in harm to a system or organization.
Vulnerability
A weakness of an asset or group of assets that can be exploited by one or more threats.
Control
A measure that reduces the risk of an unwanted incident by preventing, detecting or correcting it.
Security management system (SMS)
A systematic approach to managing security risks associated with IACS.
Security policy
A document that communicates an organization's approach to managing security risks associated with IACS.
1.1.2. IEC 62443-1-2 Master glossary of terms and abbreviations
The standard includes a master glossary of terms and abbreviations to provide a common language and understanding of key concepts and terminology that are commonly used in the IEC 62443 series of standards.
1.1.3. IEC 62443-1-3 System security compliance metrics
IEC 62443-1-3 provides a systematic approach to defining and measuring system security compliance metrics for IACS. This can help organizations ensure that their IACS meet the necessary security requirements and provide a high level of protection against cyber threats.
The standard defines several key concepts related to system security compliance metrics, including:
Security level (SL)
A measure of the degree of protection provided by a security control or set of controls.
Security assurance level (SAL)
A measure of the confidence that a security control or set of controls will perform its intended function in a given environment.
Security capability level (SCL)
A measure of the degree to which a security control or set of controls can meet the security requirements of a given environment.
Security compliance level (SCL)
A measure of the degree to which a system meets the security requirements specified in a security policy or standard.
IEC 62443-1-3 provides a framework for defining and measuring system security compliance metrics based on these concepts. The framework includes four key steps:
Define security requirements
The first step is to define the security requirements for the system based on the security policy or standard. This includes defining the SLs for each security control and the overall system.
Assess security capability
The next step is to assess the security capability of the system by evaluating the effectiveness of each security control in meeting its SL.
Evaluate security assurance
The third step is to evaluate the security assurance of the system by assessing the confidence that each security control will perform its intended function in the given environment.
Measure compliance
The final step is to measure the security compliance of the system by comparing the security capability and security assurance levels to the security requirements.
1.1.4. IEC 62443-1-4 IACS security lifecycle and use-case
IEC 62443-1-4 provides a comprehensive framework for the security lifecycle and use-case of IACS, which can help organizations ensure that their systems are designed, implemented, and operated in a secure manner that meets their specific security requirements and objectives.
The standard defines a security lifecycle model for IACS that includes six phases:
Initiation
In this phase, the need for security is identified, and the scope and objectives of the security program are defined.
Requirements and risk assessment
In this phase, the security requirements for the IACS are identified, and a risk assessment is conducted to identify potential threats and vulnerabilities.
Design and implementation
In this phase, the security controls and countermeasures are designed and implemented to mitigate the identified risks.
Verification
In this phase, the effectiveness of the security controls is verified through testing, evaluation, and auditing.
Operation and maintenance
In this phase, the IACS is operated and maintained in accordance with the security requirements and the security controls are monitored and updated as necessary.
Decommissioning
In this phase, the IACS is decommissioned and the security controls are removed or transferred to another system.
The standard also provides guidelines for the use-case of IACS security. A use-case is a description of how the system will be used to meet a specific set of objectives or requirements. The use-case should consider the specific security requirements and the potential threats and vulnerabilities of the system.
The use-case guidelines include the following steps:
Identify the system components and their roles in the use-case.
Identify the security requirements and objectives for the use-case.
Identify the potential threats and vulnerabilities that could impact the use-case.
Design and implement security controls and countermeasures to mitigate the identified risks.
Verify the effectiveness of the security controls through testing and evaluation.
Operate and maintain the system in accordance with the security requirements and the use-case.
1.2. IEC 62443-2 Policies and Procedures
The standard describes the requirements for establishing, implementing, maintaining, and continually improving an IACS SMS.
1.2.1. IEC 62443-2-1 Security program requirements for IACS asset owners
IEC 62443-2-1 provides a framework of requirements and guidelines for implementing a Security Management System (SMS) for Industrial Automation and Control Systems (IACS) for asset owners. The SMS framework helps asset owners to establish, maintain, and continually improve their security programs in a structured and efficient manner.
Compliance with IEC 62443-2-1 help asset owners to identify and mitigate security risks in their IACS environments and to establish a culture of security awareness and continuous improvement. The standard provides a comprehensive set of security program requirements that include:
Governance and Organization
Establishing and maintaining security governance and organizational structure, roles, and responsibilities for IACS security.
Asset Management
Managing the inventory of IACS components, understanding the associated risks and vulnerabilities, and defining asset criticality.
Risk Assessment
Conducting risk assessments of IACS components to identify and prioritize security risks and define appropriate mitigation measures.
Security Requirements
Establishing and implementing security requirements for IACS components based on risk assessments and security goals.
Secure Development
Ensuring that IACS components are designed, developed, and tested in accordance with security requirements.
Security Operations
Defining and implementing security policies, procedures, and controls for secure operations and maintenance of IACS components.
Incident and Vulnerability Management
Establishing processes for identifying, reporting, assessing, and responding to security incidents and vulnerabilities in IACS components.
Continual Improvement
Establishing processes for continual improvement of the security program and for measuring and monitoring the effectiveness of security controls.
1.2.2. IEC 62443-2-2 IACS Security Program Ratings
IEC 62443-2-2 provides guidance on how to rate and evaluate the effectiveness of an Industrial Automation and Control Systems (IACS) security program. The standard provides a framework for developing security program ratings that can be used to compare different security programs and to identify areas for improvement.
The security program ratings are based on a set of security program requirements and guidelines defined in IEC 62443-2-1. These requirements cover all aspects of the security program, including governance and organization, risk assessment, security requirements, secure development, security operations, incident and vulnerability management, and continual improvement.
The security program ratings framework can be used by organizations to evaluate their own security programs, or to compare their security programs with those of other organizations. The ratings can also be used by regulators and other stakeholders to evaluate the security posture of critical infrastructure sectors and to identify areas for improvement.
The security program ratings framework defines four levels of security program maturity:
Baseline
This level indicates that the security program meets the minimum requirements defined in IEC 62443-2-1, but there are areas for improvement.
Managed
At this level, the security program is managed and monitored, and there are processes in place for measuring and reporting on security program effectiveness.
Established
This level indicates that the security program is well-established and integrated into the organization's culture and operations. There are mature processes in place for managing security risks, responding to incidents and vulnerabilities, and continually improving the security program.
Robust
At this level, the security program is considered best-in-class and has achieved a high level of maturity. The organization has a proactive and strategic approach to managing security risks and has demonstrated a commitment to continual improvement.
1.2.3. IEC TR 62443-2-3 Patch management in the IACS environment
IEC TR 62443-2-3 is a Technical Report that provides guidance for patch management in Industrial Automation and Control Systems (IACS) environments. Patch management is an essential process to address vulnerabilities in IACS software and firmware that can be exploited by attackers to compromise the security of IACS.
The Technical Report covers the following aspects of patch management:
Patch Management Process
Describes the patch management process, which includes identification of patchable assets, vulnerability assessment, patch prioritization, testing, deployment, and validation.
Patch Management Roles and Responsibilities
Defines the roles and responsibilities of various stakeholders involved in patch management, including asset owners, vendors, system integrators, and service providers.
Patch Management Best Practices
Provides best practices for effective patch management, such as maintaining an up-to-date inventory of assets, establishing a patch management policy, testing patches before deployment, and validating the effectiveness of patches.
Patch Management Tools
Describes the tools and technologies that can be used for patch management, such as vulnerability scanners, patch management software, and configuration management databases.
1.2.4. IEC 62443-2-4 Security program requirements for IACS service providers
IEC 62443-2-4 provides security program requirements for IACS service providers, which are entities that provide services related to the design, development, implementation, and maintenance of IACS. The standard recognizes that service providers play a critical role in the security of IACS, as they are responsible for ensuring that their services meet the security requirements of their customers and the IACS industry.
The standard defines security program requirements for IACS service providers in the following areas:
Management Commitment
Demonstrating management's commitment to information security and establishing a security program that addresses the unique needs of IACS service providers.
Security Management System
Developing and implementing a security management system (SMS) that includes policies, procedures, and controls for managing security risks and ensuring the confidentiality, integrity, and availability of information.
Personnel Security
Ensuring that personnel are qualified, trustworthy, and trained to perform their roles and responsibilities in a secure manner.
Physical Security
Protecting the physical environment of IACS service providers, including facilities, equipment, and assets, against unauthorized access, theft, and damage.
Communications and Operations Management
Establishing and maintaining secure communications and operations management practices to ensure the secure delivery of services and the protection of IACS information.
Access Control
Implementing access control measures to ensure that only authorized personnel and entities have access to IACS information and resources.
System Development and Maintenance
Developing and maintaining secure IACS systems, including processes for testing, validation, and patch management.
Incident Management
Establishing an incident management program that includes processes for detecting, responding to, and recovering from security incidents.
1.3. IEC 62443-3 System Security
The standard provides guidance on defining the security requirements for an IACS and establishing security levels based on the criticality of the assets being protected.
1.3.1. IEC TR 62443-3-1 Security technologies for IACS
IEC TR 62443-3-1 is a technical report that provides an overview of the security technologies that can be used to protect IACS from cyber attacks. The standard is designed to help organizations select and implement appropriate security technologies to protect their IACS environments.
The standard covers a wide range of security technologies, including:
Access control
The standard provides guidance on access control technologies such as authentication, authorization, and access control lists (ACLs).
Network security
The standard provides guidance on network security technologies such as firewalls, intrusion detection and prevention systems (IDPS), and virtual private networks (VPNs).
Data security
The standard provides guidance on data security technologies such as encryption, data loss prevention (DLP), and digital signatures.
Application security
The standard provides guidance on application security technologies such as secure coding practices, application firewalls, and web application firewalls.
Physical security
The standard provides guidance on physical security technologies such as surveillance systems, access control systems, and security alarms.
Communication security
The standard provides guidance on communication security technologies such as secure protocols, secure email, and secure instant messaging.
Cloud security
The standard provides guidance on cloud security technologies such as encryption, virtualization, and access control.
Industrial control system security
The standard provides guidance on ICS-specific security technologies such as secure remote access, secure firmware updates, and secure protocol gateways.
1.3.2. IEC 62443-3-2 Security risk assessment for system design
The standard defines security requirements as the set of security objectives and measures necessary to ensure the protection of IACS assets, including people, information, and physical assets. The security requirements are derived from the security risk assessment and should be based on the principles of confidentiality, integrity, and availability including identifying potential threats, vulnerabilities, and consequences.
The standard also defines security levels as a set of security requirements that must be met to ensure a certain level of security for IACS assets. The security levels are used to provide a common language and framework for describing the security requirements and to enable the comparison of different security solutions. The security requirements cover a range of areas, including access control, data integrity, network security, physical security, and security management.
There are four security levels defined in the standard, with level 4 being the highest level of security:
Security Level 1
Basic Security
This level is appropriate for systems where the impact of a security breach is low, and the likelihood of a breach is also low. The security requirements at this level focus on basic measures such as password policies, user authentication, and basic network segmentation.
Security Level 2
Enhanced Security
This level is appropriate for systems where the impact of a security breach is moderate, and the likelihood of a breach is also moderate. The security requirements at this level include more advanced measures such as secure communication protocols, intrusion detection systems, and more robust access control mechanisms.
Security Level 3
High Security
This level is appropriate for systems where the impact of a security breach is high, and the likelihood of a breach is also high. The security requirements at this level include more advanced measures such as encryption, advanced intrusion detection and prevention systems, and more comprehensive network segmentation.
Security Level 4
Very High Security
This level is appropriate for systems where the impact of a security breach is extremely high, and the likelihood of a breach is also extremely high. The security requirements at this level include the most advanced measures such as physically isolated networks, highly secure access control mechanisms, and advanced threat intelligence systems.
The standard recommends that the security requirements and security levels be documented in a security specification for the IACS. The security specification should include a description of the security objectives, the security requirements for each security level, and the procedures for verifying compliance with the security requirements.
1.3.3. IEC 62443-3-3 System security requirements and security levels
IEC 62443-3-3 provides a comprehensive framework for defining and implementing appropriate security requirements and security levels based on IEC 62443-3-2 for IACS systems. The standard is designed to help organizations define and implement appropriate security requirements and security levels for their IACS environments.
The standard defines security levels as a way to measure the security robustness of an IACS system. Security levels are assigned based on the level of protection needed for the system based on its criticality, the consequences of a security breach, and the potential impact on safety, production, and the environment.
The standard provides guidance on defining security requirements for IACS systems based on their security level. The security requirements are divided into categories, including access control, communications security, system integrity, data confidentiality, and data integrity. The requirements for each category vary depending on the security level assigned to the system.
IEC 62443-3-3 also provides guidance on the process of selecting and implementing security measures to meet the defined security requirements. The standard recommends a risk-based approach to security, where risks are identified, assessed, and mitigated through the selection and implementation of appropriate security measures.
1.4. IEC 62443-4 Component Security
The standard provides guidance on incorporating security into the product development lifecycle of IACS components, including hardware, software, and firmware.
1.4.1. IEC 62443-4-1 Secure product development lifecycle requirements
IEC 62443-4-1 provides a set of requirements for developing and implementing a secure SDL for IACS products. By following these requirements, organizations can ensure that their products are designed and implemented with security in mind, reducing the likelihood of security vulnerabilities being introduced into the product. The standard is designed to help organizations develop and implement a secure SDL for their IACS products.
The standard provides a set of requirements that should be considered when developing and implementing a secure SDL for IACS products. These requirements include:
Security management
The standard requires that the SDL should be integrated with the organization's overall security management system (SMS) and that the SDL should be aligned with the organization's security policies and procedures.
Secure design
The standard provides guidance on designing products with security in mind, including threat modeling, risk assessment, and security requirements definition.
Secure coding
The standard provides guidance on writing secure code, including coding standards, code reviews, and testing.
Security testing
The standard provides guidance on testing products for security vulnerabilities, including vulnerability scanning, penetration testing, and fuzz testing.
Secure deployment
The standard provides guidance on securely deploying products, including secure configuration, hardening, and deployment processes.
Security maintenance
The standard provides guidance on maintaining product security throughout its lifecycle, including patch management, vulnerability management, and incident response.
1.4.2. IEC 62443-4-2 Technical security requirements for IACS components
IEC 62443-4-2 provides a set of technical security requirements for IACS components, including network devices, controllers, and sensors. The standard is designed to help organizations ensure that their IACS components are developed and implemented with security in mind.
The standard provides a set of technical security requirements that should be considered when developing and implementing IACS components. These requirements include:
Security capabilities
The standard requires that IACS components should have security capabilities that are appropriate for the intended use of the component. This includes capabilities such as access control, secure communication, and secure storage.
Secure communication
The standard requires that IACS components should use secure communication protocols to protect against eavesdropping, tampering, and other attacks.
Secure storage
The standard requires that IACS components should use secure storage mechanisms to protect against unauthorized access and tampering.
Access control
The standard requires that IACS components should use access control mechanisms to ensure that only authorized users can access the component and its data.
Security monitoring
The standard requires that IACS components should have security monitoring capabilities to detect and respond to security incidents.
Security updates
The standard requires that IACS components should have the ability to receive security updates to address known vulnerabilities.
2. Terminology
IEC 62443 provides a comprehensive terminology to describe the different aspects of securing IACS.
Industrial automation and control systems (IACS)
Systems that control and monitor industrial processes, such as manufacturing, energy production, and transportation.
Cybersecurity
The practice of protecting computer systems, networks, and data from unauthorized access, theft, damage, or other malicious actions.
Threat
A potential event or action that could harm a system or network.
Vulnerability
A weakness in a system or network that could be exploited by an attacker.
Risk
The likelihood and potential impact of a threat exploiting a vulnerability.
Security management system (SMS)
A comprehensive set of policies, procedures, and controls that are implemented to manage an organization's information security risks.
Security level
A measure of the effectiveness of a security control or set of controls in mitigating a risk.
Security capability
A set of security features or functions that are designed to address a specific security need.
Security zone
A logical grouping of assets or systems based on their security requirements.
IEC 62443
IEC 62443 is a series of international standards developed by the International Electrotechnical Commission (IEC) that provides a framework for implementing cybersecurity in industrial automation and control systems (IACS). The series comprises of several parts, each of which addresses a specific aspect of IACS cybersecurity.
The standards are designed to provide a systematic approach to IACS security, addressing the entire lifecycle of the system from concept to retirement. This includes defining security requirements, designing secure systems, implementing security controls, and continuously monitoring and improving the security posture of the system.
IEC 62443 provides a comprehensive approach to IACS cybersecurity that takes into account the unique requirements and challenges of these systems. The standards are designed to be flexible and scalable, allowing organizations to tailor their approach to their specific needs and risk profile.
The IEC 62443 series is widely recognized as a leading standard for IACS cybersecurity and is used by organizations around the world to help secure their critical infrastructure.
1. Category
The IEC 62443 series of standards is organized into four main categories, each of which addresses a different aspect of IACS security.
1.1. IEC 62443-1 General Concepts
The standard provides an introduction to the IEC 62443 series and describes the general concepts and terminology used in IACS security.
1.1.1. IEC 62443-1-1 Terminology, concepts and models
The IEC 62443-1-1 standard provides a common language and conceptual framework for IACS security. It defines terms and concepts used throughout the series and provides a model for understanding the components and interactions of IACS.
Key terms defined in IEC 62443-1-1:
Cybersecurity
Risk
Asset
Threat
Vulnerability
Control
Security management system (SMS)
Security policy
1.1.2. IEC 62443-1-2 Master glossary of terms and abbreviations
The standard includes a master glossary of terms and abbreviations to provide a common language and understanding of key concepts and terminology that are commonly used in the IEC 62443 series of standards.
1.1.3. IEC 62443-1-3 System security compliance metrics
IEC 62443-1-3 provides a systematic approach to defining and measuring system security compliance metrics for IACS. This can help organizations ensure that their IACS meet the necessary security requirements and provide a high level of protection against cyber threats.
The standard defines several key concepts related to system security compliance metrics, including:
Security level (SL)
Security assurance level (SAL)
Security capability level (SCL)
Security compliance level (SCL)
IEC 62443-1-3 provides a framework for defining and measuring system security compliance metrics based on these concepts. The framework includes four key steps:
Define security requirements
Assess security capability
Evaluate security assurance
Measure compliance
1.1.4. IEC 62443-1-4 IACS security lifecycle and use-case
IEC 62443-1-4 provides a comprehensive framework for the security lifecycle and use-case of IACS, which can help organizations ensure that their systems are designed, implemented, and operated in a secure manner that meets their specific security requirements and objectives.
The standard defines a security lifecycle model for IACS that includes six phases:
Initiation
Requirements and risk assessment
Design and implementation
Verification
Operation and maintenance
Decommissioning
The standard also provides guidelines for the use-case of IACS security. A use-case is a description of how the system will be used to meet a specific set of objectives or requirements. The use-case should consider the specific security requirements and the potential threats and vulnerabilities of the system.
The use-case guidelines include the following steps:
Identify the system components and their roles in the use-case.
Identify the security requirements and objectives for the use-case.
Identify the potential threats and vulnerabilities that could impact the use-case.
Design and implement security controls and countermeasures to mitigate the identified risks.
Verify the effectiveness of the security controls through testing and evaluation.
Operate and maintain the system in accordance with the security requirements and the use-case.
1.2. IEC 62443-2 Policies and Procedures
The standard describes the requirements for establishing, implementing, maintaining, and continually improving an IACS SMS.
1.2.1. IEC 62443-2-1 Security program requirements for IACS asset owners
IEC 62443-2-1 provides a framework of requirements and guidelines for implementing a Security Management System (SMS) for Industrial Automation and Control Systems (IACS) for asset owners. The SMS framework helps asset owners to establish, maintain, and continually improve their security programs in a structured and efficient manner.
Compliance with IEC 62443-2-1 help asset owners to identify and mitigate security risks in their IACS environments and to establish a culture of security awareness and continuous improvement. The standard provides a comprehensive set of security program requirements that include:
Governance and Organization
Asset Management
Risk Assessment
Security Requirements
Secure Development
Security Operations
Incident and Vulnerability Management
Continual Improvement
1.2.2. IEC 62443-2-2 IACS Security Program Ratings
IEC 62443-2-2 provides guidance on how to rate and evaluate the effectiveness of an Industrial Automation and Control Systems (IACS) security program. The standard provides a framework for developing security program ratings that can be used to compare different security programs and to identify areas for improvement.
The security program ratings are based on a set of security program requirements and guidelines defined in IEC 62443-2-1. These requirements cover all aspects of the security program, including governance and organization, risk assessment, security requirements, secure development, security operations, incident and vulnerability management, and continual improvement.
The security program ratings framework can be used by organizations to evaluate their own security programs, or to compare their security programs with those of other organizations. The ratings can also be used by regulators and other stakeholders to evaluate the security posture of critical infrastructure sectors and to identify areas for improvement.
The security program ratings framework defines four levels of security program maturity:
Baseline
Managed
Established
Robust
1.2.3. IEC TR 62443-2-3 Patch management in the IACS environment
IEC TR 62443-2-3 is a Technical Report that provides guidance for patch management in Industrial Automation and Control Systems (IACS) environments. Patch management is an essential process to address vulnerabilities in IACS software and firmware that can be exploited by attackers to compromise the security of IACS.
The Technical Report covers the following aspects of patch management:
Patch Management Process
Patch Management Roles and Responsibilities
Patch Management Best Practices
Patch Management Tools
1.2.4. IEC 62443-2-4 Security program requirements for IACS service providers
IEC 62443-2-4 provides security program requirements for IACS service providers, which are entities that provide services related to the design, development, implementation, and maintenance of IACS. The standard recognizes that service providers play a critical role in the security of IACS, as they are responsible for ensuring that their services meet the security requirements of their customers and the IACS industry.
The standard defines security program requirements for IACS service providers in the following areas:
Management Commitment
Security Management System
Personnel Security
Physical Security
Communications and Operations Management
Access Control
System Development and Maintenance
Incident Management
1.3. IEC 62443-3 System Security
The standard provides guidance on defining the security requirements for an IACS and establishing security levels based on the criticality of the assets being protected.
1.3.1. IEC TR 62443-3-1 Security technologies for IACS
IEC TR 62443-3-1 is a technical report that provides an overview of the security technologies that can be used to protect IACS from cyber attacks. The standard is designed to help organizations select and implement appropriate security technologies to protect their IACS environments.
The standard covers a wide range of security technologies, including:
Access control
Network security
Data security
Application security
Physical security
Communication security
Cloud security
Industrial control system security
1.3.2. IEC 62443-3-2 Security risk assessment for system design
The standard defines security requirements as the set of security objectives and measures necessary to ensure the protection of IACS assets, including people, information, and physical assets. The security requirements are derived from the security risk assessment and should be based on the principles of confidentiality, integrity, and availability including identifying potential threats, vulnerabilities, and consequences.
The standard also defines security levels as a set of security requirements that must be met to ensure a certain level of security for IACS assets. The security levels are used to provide a common language and framework for describing the security requirements and to enable the comparison of different security solutions. The security requirements cover a range of areas, including access control, data integrity, network security, physical security, and security management.
There are four security levels defined in the standard, with level 4 being the highest level of security:
Security Level 1
Security Level 2
Security Level 3
Security Level 4
The standard recommends that the security requirements and security levels be documented in a security specification for the IACS. The security specification should include a description of the security objectives, the security requirements for each security level, and the procedures for verifying compliance with the security requirements.
1.3.3. IEC 62443-3-3 System security requirements and security levels
IEC 62443-3-3 provides a comprehensive framework for defining and implementing appropriate security requirements and security levels based on IEC 62443-3-2 for IACS systems. The standard is designed to help organizations define and implement appropriate security requirements and security levels for their IACS environments.
The standard defines security levels as a way to measure the security robustness of an IACS system. Security levels are assigned based on the level of protection needed for the system based on its criticality, the consequences of a security breach, and the potential impact on safety, production, and the environment.
The standard provides guidance on defining security requirements for IACS systems based on their security level. The security requirements are divided into categories, including access control, communications security, system integrity, data confidentiality, and data integrity. The requirements for each category vary depending on the security level assigned to the system.
IEC 62443-3-3 also provides guidance on the process of selecting and implementing security measures to meet the defined security requirements. The standard recommends a risk-based approach to security, where risks are identified, assessed, and mitigated through the selection and implementation of appropriate security measures.
1.4. IEC 62443-4 Component Security
The standard provides guidance on incorporating security into the product development lifecycle of IACS components, including hardware, software, and firmware.
1.4.1. IEC 62443-4-1 Secure product development lifecycle requirements
IEC 62443-4-1 provides a set of requirements for developing and implementing a secure SDL for IACS products. By following these requirements, organizations can ensure that their products are designed and implemented with security in mind, reducing the likelihood of security vulnerabilities being introduced into the product. The standard is designed to help organizations develop and implement a secure SDL for their IACS products.
The standard provides a set of requirements that should be considered when developing and implementing a secure SDL for IACS products. These requirements include:
Security management
Secure design
Secure coding
Security testing
Secure deployment
Security maintenance
1.4.2. IEC 62443-4-2 Technical security requirements for IACS components
IEC 62443-4-2 provides a set of technical security requirements for IACS components, including network devices, controllers, and sensors. The standard is designed to help organizations ensure that their IACS components are developed and implemented with security in mind.
The standard provides a set of technical security requirements that should be considered when developing and implementing IACS components. These requirements include:
Security capabilities
Secure communication
Secure storage
Access control
Security monitoring
Security updates
2. Terminology
IEC 62443 provides a comprehensive terminology to describe the different aspects of securing IACS.
Industrial automation and control systems (IACS)
Cybersecurity
Threat
Vulnerability
Risk
Security management system (SMS)
Security level
Security capability
Security zone
Conduit