Railway applications - Cybersecurity

Železniške naprave - Kibernetska varnost

General Information

Status
Not Published
Publication Date
15-Feb-2027
Current Stage
4020 - Enquiry circulated - Enquiry
Start Date
01-Aug-2025
Due Date
30-Apr-2025
Completion Date
01-Aug-2025

Relations

Buy Standard

Draft
prEN IEC 63452:2025 - BARVE
English language
283 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)


SLOVENSKI STANDARD
01-september-2025
Železniške naprave - Kibernetska varnost
Railway applications - Cybersecurity
Ta slovenski standard je istoveten z: prEN IEC 63452:2025
ICS:
35.030 Informacijska varnost IT Security
45.020 Železniška tehnika na Railway engineering in
splošno general
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

9/3232A/CDV
COMMITTEE DRAFT FOR VOTE (CDV)
PROJECT NUMBER:
IEC 63452 ED1
DATE OF CIRCULATION: CLOSING DATE FOR VOTING:
2025-08-08 (2025-07-18) 2025-10-17 (2025-10-10)
SUPERSEDES DOCUMENTS:
9/3000/CD, 9/3036A/CC
IEC TC 9 : ELECTRICAL EQUIPMENT AND SYSTEMS FOR RAILWAYS
SECRETARIAT: SECRETARY:
France Mr Denis MIGLIANICO
OF INTEREST TO THE FOLLOWING COMMITTEES: HORIZONTAL FUNCTION(S):
TC 65
ASPECTS CONCERNED:
Information security and data privacy
SUBMITTED FOR CENELEC PARALLEL VOTING NOT SUBMITTED FOR CENELEC PARALLEL VOTING
Attention IEC-CENELEC parallel voting
The attention of IEC National Committees, members of CENELEC, is
drawn to the fact that this Committee Draft for Vote (CDV) is submitted
for parallel voting.
The CENELEC members are invited to vote through the CENELEC
online voting system.
This document is still under study and subject to change. It should not be used for reference purposes.
Recipients of this document are invited to submit, with their comments, notification of any relevant patent rights of which they are
aware and to provide supporting documentation.
Recipients of this document are invited to submit, with their comments, notification of any relevant “In Some Countries” clauses to
be included should this proposal proceed. Recipients are reminded that the CDV stage is the final stage for submitting ISC clauses.
(SEE AC/22/2007 OR NEW GUIDANCE DOC).
TITLE:
Railway applications – Cybersecurity
PROPOSED STABILITY DATE: 2028
NOTE FROM TC/SC OFFICERS:
This A version shows aligned Word extraction from the OSD in regards of annexes and figures. The closing date for
voting has been extended to 2025-10-17. No technical modification has been made.
st
The Cenelec parallel vote status of this project has been changed on 1 of August, as reflected on this coverpage.
electronic file, to make a copy and to print out the content for the sole purpose of preparing National Committee positions.
You may not copy or "mirror" the file or printed version of the document, or any part of it, for any other purpose without
permission in writing from IEC.

Link to Committee Draft for Vote (CDV) online document:

https://osd.iec.ch/#/editor/archive/0e847a8f-d663-e6d5-e063-1710000a30d0/en/CCDV/1

How to access
This link leads you to the Online Standards Development (OSD) platform for National Mirror Committee’s
(NMC) comments. The project draft may be found further down this document.

Resource materials
We recommend NCs to review the available materials to better understand the member commenting on the
OSD platform. This includes the:
• OSD NC roles overview: here
• How to add and submit comments to the IEC: here
Contact
Should you require any assistance, please contact the IEC IT Helpdesk at helpdesk@iec.ch.

IEC CDV 63452 ED1 © IEC 2025
CONTENTS
CONTENTS . 1
FOREWORD . 13
Introduction. 15
Purpose . 15
Overview of the structure of this document . 15
1 Scope . 17
2 Normative references . 17
3 Terms and definitions, abbreviated terms and acronyms, taxonomy and terms
equivalence . 17
3.1 Terms and definitions. 17
3.2 Abbreviated terms and acronyms . 46
3.3 Railway system taxonomy and terms equivalence . 50
4 Railway system overview . 53
4.1 Purpose . 53
4.2 Overview . 53
4.3 Inputs / Outputs . 54
4.4 [SO-01-01] Identification of the railway system . 54
4.4.1 Requirement . 54
4.4.2 Rationale and supplemental guidance . 54
4.5 [SO-02-01] Definition of a high-level railway system model . 56
4.5.1 Requirement . 56
4.5.2 Rationale and supplemental guidance . 56
4.6 [SO-03-01] Definition of a high-level railway zone model . 58
4.6.1 Requirement . 58
4.6.2 Rationale and supplemental guidance . 58
4.7 [SO-04-01] Specification of shared cybersecurity services . 60
4.7.1 Requirement . 60
4.7.2 Rationale and supplemental guidance . 60
5 Enterprise cybersecurity programme and management . 62
5.1 Overview . 62
5.2 Inputs / Outputs . 62
5.3 [CP-01-01] Railway OT cybersecurity policy . 63
5.3.1 Requirement . 63
5.3.2 Rationale and supplemental guidance . 63
5.4 [CP-01-02] Railway OT cybersecurity programme . 63
5.4.1 Requirement . 63
5.4.2 Rationale and supplemental guidance . 64
5.5 [CP-02-01] Information sharing management . 65
5.5.1 Requirement . 65
5.5.2 Rationale and supplemental guidance . 65
5.6 [CP-03-01] Competency management . 65
5.6.1 Requirement . 65
5.6.2 Rationale and supplemental guidance . 66
5.7 [CP-04-01] Inventory management . 66
5.7.1 Requirement . 66
5.7.2 Rationale and supplemental guidance . 67
IEC CDV 63452 ED1 © IEC 2025
5.8 [CP-05-01] Supply chain management . 67
5.8.1 Requirement . 67
5.8.2 Rationale and supplemental guidance . 67
5.9 [CP-06-01] Risk management . 70
5.9.1 Requirement . 70
5.9.2 Rationale and supplemental guidance . 71
5.10 [CP-07-01] Business continuity management . 71
5.10.1 Requirement . 71
5.10.2 Rationale and supplemental guidance . 72
5.11 [CP-08-01] Data protection management . 72
5.11.1 Requirement . 72
5.11.2 Rationale and supplemental guidance . 73
6 Cybersecurity within a railway application life cycle . 74
6.1 Purpose . 74
6.2 Railway application and product life cycles . 74
6.3 Manage cybersecurity activities and interfaces . 74
6.3.1 Inputs / Outputs . 74
6.3.2 [LC-01-01] Assign Project Cybersecurity Manager . 74
6.3.3 [LC-02-01] Plan project cybersecurity activities till the handover . 75
6.3.4 [LC-02-02] Tailoring the cybersecurity management plan . 76
6.3.5 [LC-02-03] Cybersecurity management plan approval . 76
6.3.6 [LC-02-04] Management of security issues before handover . 77
6.3.7 [LC-03-01] Manage product suppliers . 77
6.3.8 [LC-04-01] Manage interaction with safety and RAM teams . 77
6.4 Cybersecurity activities mapping to the IEC 62278-1 life cycle . 78
7 Risk assessment for system design . 83
7.1 Purpose and outcome . 83
7.2 Overview . 83
7.3 Identify the SUC and its security context . 86
7.3.1 Description . 86
7.3.2 Inputs / Outputs . 86
7.3.3 [ZR-01-01] Identify the SUC, its security perimeter and access points . 86
7.3.4 [ZR-01-02] Identify the cybersecurity context . 87
7.4 Initial Risk Assessment . 89
7.4.1 Description . 89
7.4.2 Inputs / Outputs . 89
7.4.3 [ZR-02-01] Initial risk assessment . 89
7.5 Partitioning of the SUC in zones and conduits . 90
7.5.1 Description . 90
7.5.2 Inputs / Outputs . 90
7.5.3 [ZR-03-01] Partitioning of the SUC . 90
7.6 Risk comparison . 91
7.6.1 Description . 91
7.6.2 Inputs / Outputs . 91
7.6.3 [ZR-04-01] Compare initial risk with tolerable risk . 91
7.7 Detailed Risk Assessment . 92
7.7.1 Description . 92
7.7.2 Inputs / Outputs . 92
7.7.3 [ZR-05-01] Perform Detailed Risk Assessment . 92
IEC CDV 63452 ED1 © IEC 2025
7.7.4 [ZR-05-02] Identify threats .
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.