Security for industrial automation and control systems – Part 2-2: IACS security protection scheme

IEC PAS 62443-2-2: 2025 provides guidance on the development, validation, operation, and maintenance of a set of technical, physical, and process security measures called Security Protection Scheme (SPS). The document’s goal is to provide the asset owner implementing an IACS Security Program (SP) with mechanisms and procedures to ensure that the design, implementation and operation of an SPS manage the risks resulting from cyberthreats to each of the IACS included in its operating facility.
The document is based on contents specified in other documents of the IEC 62443 series and explains how these contents can be used to support the development of technical, physical, and process security measures addressing the risks to the IACS during the operation phase.

General Information

Status
Published
Publication Date
10-Mar-2025
Drafting Committee
WG 10 - TC 65/WG 10
Current Stage
PPUB - Publication issued
Start Date
11-Mar-2025
Completion Date
11-Apr-2025

Overview

IEC PAS 62443-2-2:2025 - "Security for industrial automation and control systems – Part 2-2: IACS security protection scheme" - provides guidance for developing, validating, operating and maintaining a coordinated set of technical, physical and process security measures called a Security Protection Scheme (SPS). Targeted at asset owners implementing an IACS Security Program (SP), the PAS explains how to apply IEC 62443 series content to manage cyber risks to Industrial Automation and Control Systems (IACS) during the operation phase.

Keywords: IEC PAS 62443-2-2, IACS security protection scheme, SPS, industrial control systems, OT security, asset owner, cybersecurity.

Key Topics

  • Scope and lifecycle: Guidance covers SPS generation, validation, operation and periodic revalidation across the IACS life cycle.
  • Security Protection Ratings (SPR) and Security Levels (SL): Methods for assigning and predicting SPR values; linkage to SL concepts and use of a maturity model (referencing IEC 62443-2-1) are described.
  • Process steps and roles: Defined process steps to generate an SPS and responsibilities for principal roles (asset owner, integration service provider, maintenance service provider, product supplier).
  • Cybersecurity Requirement Specification (CRS): Activities and responsibilities for creating CRS documents that drive technical and process measures.
  • Validation and verification: Guidance for validating technical, physical and procedural controls, including annexed methodologies for SPR verification and maturity level assessment.
  • Views and dashboards: Concepts for visualizing fulfilment of security requirements and SPS status (e.g., generic/system views).
  • Annexes: Informative examples for SPR verification methodology and maturity level (ML) assessment to support practical assessment.

Applications

Who uses IEC PAS 62443-2-2 and how:

  • Asset owners / operators: Design, document and operate an SPS to ensure ongoing protection of IACS assets and to manage cyber risk during operation.
  • Integration and maintenance service providers: Implement technical and process controls according to CRS and support validation and periodic revalidation.
  • Product suppliers: Map product capabilities to SLs and participate in SPS validation and evidence provision.
  • OT security teams and consultants: Use the SPR/SL mapping, maturity model and verification approaches to evaluate and improve operational security posture.

Practical uses include SPS design, preparing CRS, validating technical measures, conducting SPR assessments, and establishing periodic revalidation processes.

Related Standards

  • IEC 62443 series (general framework for IACS security)
  • IEC 62443-2-1 (security program maturity model referenced for SPR determination)

IEC PAS 62443-2-2 complements these standards by focusing on how to assemble and maintain an operational Security Protection Scheme for industrial control systems.

Technical specification

IEC PAS 62443-2-2:2025 - Security for industrial automation and control systems – Part 2-2: IACS security protection scheme Released:11. 03. 2025 Isbn:9782832702994

English language
44 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

IEC PAS 62443-2-2:2025 is a technical specification published by the International Electrotechnical Commission (IEC). Its full title is "Security for industrial automation and control systems – Part 2-2: IACS security protection scheme". This standard covers: IEC PAS 62443-2-2: 2025 provides guidance on the development, validation, operation, and maintenance of a set of technical, physical, and process security measures called Security Protection Scheme (SPS). The document’s goal is to provide the asset owner implementing an IACS Security Program (SP) with mechanisms and procedures to ensure that the design, implementation and operation of an SPS manage the risks resulting from cyberthreats to each of the IACS included in its operating facility. The document is based on contents specified in other documents of the IEC 62443 series and explains how these contents can be used to support the development of technical, physical, and process security measures addressing the risks to the IACS during the operation phase.

IEC PAS 62443-2-2: 2025 provides guidance on the development, validation, operation, and maintenance of a set of technical, physical, and process security measures called Security Protection Scheme (SPS). The document’s goal is to provide the asset owner implementing an IACS Security Program (SP) with mechanisms and procedures to ensure that the design, implementation and operation of an SPS manage the risks resulting from cyberthreats to each of the IACS included in its operating facility. The document is based on contents specified in other documents of the IEC 62443 series and explains how these contents can be used to support the development of technical, physical, and process security measures addressing the risks to the IACS during the operation phase.

IEC PAS 62443-2-2:2025 is classified under the following ICS (International Classification for Standards) categories: 25.040.40 - Industrial process measurement and control; 35.100.05 - Multilayer applications. The ICS classification helps identify the subject area and facilitates finding related standards.

You can purchase IEC PAS 62443-2-2:2025 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of IEC standards.

Standards Content (Sample)


IEC PAS 62443-2-2 ®
Edition 1.0 2025-03
PUBLICLY AVAILABLE
SPECIFICATION
Security for industrial automation and control systems –
Part 2-2: IACS security protection scheme

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.

IEC Secretariat Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.

About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigendum or an amendment might have been published.

IEC publications search - webstore.iec.ch/advsearchform IEC Products & Services Portal - products.iec.ch
The advanced search enables to find IEC publications by a Discover our powerful search engine and read freely all the
variety of criteria (reference number, text, technical publications previews, graphical symbols and the glossary.
committee, …). It also gives information on projects, replaced With a subscription you will always have access to up to date
and withdrawn publications. content tailored to your needs.

IEC Just Published - webstore.iec.ch/justpublished
Electropedia - www.electropedia.org
Stay up to date on all new IEC publications. Just Published
The world's leading online dictionary on electrotechnology,
details all new publications released. Available online and once
containing more than 22 500 terminological entries in English
a month by email.
and French, with equivalent terms in 25 additional languages.

Also known as the International Electrotechnical Vocabulary
IEC Customer Service Centre - webstore.iec.ch/csc
(IEV) online.
If you wish to give us your feedback on this publication or need

further assistance, please contact the Customer Service
Centre: sales@iec.ch.
IEC PAS 62443-2-2 ®
Edition 1.0 2025-03
PUBLICLY AVAILABLE
SPECIFICATION
Security for industrial automation and control systems –

Part 2-2: IACS security protection scheme

INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
ICS 25.040.40; 35.100.05 ISBN 978-2-8327-0299-4

– 2 – IEC PAS 62443-2-2:2025 © IEC 2025
CONTENTS
FOREWORD . 4
INTRODUCTION . 6
1 Scope . 7
2 Normative references . 7
3 Terms, definitions, abbreviated terms and acronyms . 8
3.1 Terms and definitions . 8
3.2 Abbreviated terms and acronyms . 10
4 Relationship between this document and other documents . 10
5 Security program and security protection scheme . 11
5.1 Relationship between security program and security protection scheme. 11
5.2 Process steps for the generation of a Security Protection Scheme . 12
6 Security protection ratings . 14
6.1 Overview. 14
6.2 Use of the maturity model defined in IEC 62443-2-1 for the determination of
SPR values . 15
6.3 Use of alternative SPR matrixes for internal purposes . 17
6.4 Grouping of security requirements . 18
6.5 Tracing to SPEs and sub-SPEs . 18
6.6 Views . 19
6.7 SPR and SL types . 20
6.7.1 General . 20
6.7.2 SL types for products . 20
6.7.3 SPR types used in an IACS life cycle . 20
7 Principal roles. 22
7.1 Overview. 22
7.2 Asset owner . 23
7.3 Integration service provider . 24
7.4 Maintenance service provider . 24
7.5 Product supplier . 24
7.6 Other roles . 25
8 Duties and activities in the IACS life cycle related to the security protection
scheme . 25
8.1 Overview. 25
8.2 Generation of the cybersecurity requirement specification (CRS) . 26
8.3 Design and implementation of the security measures . 27
8.4 Generation and documentation of the process security measures . 30
8.5 Validation of the security protection scheme . 30
8.5.1 Overview . 30
8.5.2 Validation of the technical security measures . 31
8.5.3 Validation of the process security measures . 32
8.5.4 Prediction of the SPR values, SPR-I . 32
8.6 Periodic revalidation of the SPS during operation . 33
Annex A (informative) Example of methodology for SPR verification . 34
A.1 Overview. 34
A.2 Detailed assessment, requirements-based . 34
A.3 Detailed assessment, risk-based . 35

A.4 Simplified evaluation, questions-based . 35
Annex B (informative) Maturity level assessment . 36
B.1 General . 36
B.2 Overall assessment work process . 36
B.3 Maturity level assessment procedure . 36
B.4 Security program maturity level assessment attributes . 39
B.5 ML assessment documentation . 42
Bibliography . 44

Figure 1 – Simplified asset owner security protection scheme (SPS) life cycle . 7
Figure 2 – Security program and security protection scheme . 12
Figure 3 – Process steps for generating a security protection scheme . 13
Figure 4 – Maturity model . 15
Figure 5 – Determination of the SPR value by using the maturity model of
IEC 62443-2-1 . 16
Figure 6 – Example of visualizing the fulfilment of a system security requirement with
an SPR value . 17
Figure 7 – Examples of alternative SPR matrix for internal purposes . 18
Figure 8 – Example of a dashboard for the generic view . 20
Figure 9 – Use of SPR and SL types in the IACS life cycle . 22
Figure 10 – Roles and responsibilities overview . 23
Figure 11 – Life cycle phases and roles . 26
Figure 12 – Iterations in the IACS life cycle . 26
Figure 13 – Activities and responsibilities for the generation of the CRS (simplified
view) . 27
Figure 14 – Activities and responsibilities for the design and implementation of the
technical security measures applied to the automation solution (simplified view). 28
Figure 15 – Activities and responsibilities for the documentation of process security
measures (simplified view) . 30
Figure 16 – Example of the determination of the SL value which can be met with
capabilities provided by the technical security measures . 31
Figure 17 – Example of the prediction of the SPR value . 32
Figure B.1 – Example ML assessment based on IEC 62443-2-1 . 43

Table B.1 – Assessment MLs . 36
Table B.2 – Maturity level assessment procedure . 37
Table B.3 – Security program maturity level assessment attributes . 39

– 4 – IEC PAS 62443-2-2:2025 © IEC 2025
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS –

Part 2-2: IACS security protection scheme

FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote international
co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and
in addition to other activities, IEC publishes International Standards, Technical Specifications, Technical Reports,
Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC Publication(s)”). Their
preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with
may participate in this preparatory work. International, governmental and non-governmental organizations liaising
with the IEC also participate in this preparation. IEC collaborates closely with the International Organization for
Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence between
any IEC Publication and the corresponding national or regional publication shall be clearly indicated in the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) IEC draws attention to the possibility that the implementation of this document may involve the use of (a)
patent(s). IEC takes no position concerning the evidence, validity or applicability of any claimed patent rights in
respect thereof. As of the date of publication of this document, IEC had not received notice of (a) patent(s), which
may be required to implement this document. However, implementers are cautioned that this may not represent
the latest information, which may be obtained from the patent database available at https://patents.iec.ch. IEC
shall not be held responsible for identifying any or all such patent rights.
IEC 62443-2-2 has been prepared by IEC technical committee 65: Industrial-process
measurement, control and automation. It is a Publicly Available Specification.
IEC PAS 62443-2-2 has been developed by IEC TC 65 and the liaison ISA99: ISA committee
on Security for industrial automation and control systems.
The text of this Publicly Available Specification is based on the following documents:
Draft Report on voting
65/1051/DPAS 65/1121/RVDPAS
Full information on the voting for its approval can be found in the report on voting indicated in
the above table.
The language used for the development of this Publicly Available Specification is English.
This document was drafted in accordance with ISO/IEC Directives, Part 2, and developed in
accordance with ISO/IEC Directives, Part 1 and ISO/IEC Directives, IEC Supplement, and the
ISO/IEC Directives, JTC 1 Supplement available at www.iec.ch/members_experts/refdocs. The
main document types developed by IEC are described in greater detail at
www.iec.ch/publications.
A list of all parts in the IEC 62443 series, published under the general title Security for industrial
automation and control systems, can be found on the IEC website.
The committee has decided that the contents of this document will remain unchanged until the
stability date indicated on the IEC website under webstore.iec.ch in the data related to the
specific document. At this date, the document will be
• reconfirmed,
• withdrawn, or
• revised.
NOTE In accordance with ISO/IEC Directives, Part 1, IEC PASs are automatically withdrawn after 4 years.

– 6 – IEC PAS 62443-2-2:2025 © IEC 2025
INTRODUCTION
This document is the part of the IEC 62443 series that provides guidance on the development
and validation of a set of technical, physical, and process security measures to address risk
associated with cyberthreats when operating IACS. In the context of this document, asset owner
also includes the operator of the IACS.
The purpose of the document is to provide input to support asset owners, integration service
providers, maintenance service providers as well as product suppliers in their activities to
provide a combination of technical, physical, and organizational capabilities for protecting IACS
against cyberthreat.
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS –

Part 2-2: IACS security protection scheme

1 Scope
This part of IEC 62443 provides guidance on the development, validation, operation, and
maintenance of a set of technical, physical, and process security measures called Security
Protection Scheme (SPS). The document’s goal is to provide the asset owner implementing an
IACS Security Program (SP) with mechanisms and procedures to ensure that the design,
implementation and operation of an SPS manage the risks resulting from cyberthreats to each
of the IACS included in its operating facility.
The document is based on contents specified in other documents of the IEC 62443 series and
explains how these contents can be used to support the development of technical, physical,
and process security measures addressing the risks to the IACS during the operation phase.
Figure 1 illustrates the content of this document using a simplified IACS life cycle.

Figure 1 – Simplified asset owner security protection scheme (SPS) life cycle
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies.
For undated references, the latest edition of the referenced document (including any
amendments) applies.
IEC TS 62443-1-1:2009, Industrial communication networks – Network and system security –
Part 1-1: Terminology, concepts and models

– 8 – IEC PAS 62443-2-2:2025 © IEC 2025
IEC 62443-2-1:— , Security for industrial automation and control systems – Part 2-1: Security
program requirements for IACS asset owners
IEC 62443-2-4:2023, Security for industrial automation and control systems – Part 2-4: Security
program requirements for IACS service providers
IEC 62443-3-2:2020, Security for industrial automation and control systems – Part 3-2: Security
risk assessment for system design
IEC 62443-3-3:2013, Industrial communication networks – Network and system security –
Part 3-3: System security requirements and security levels
3 Terms, definitions, abbreviated terms and acronyms
For the purposes of this document, the terms and definitions given in IEC TS 62443‑1‑1 and
the following apply.
ISO and IEC maintain terminological databases for use in standardization at the following
addresses:
• IEC Electropedia: available at https://www.electropedia.org/
• ISO Online browsing platform: available at https://www.iso.org/obp
NOTE Terms and definitions are defined in IEC TS 62443-1-1. The purpose of this clause is to provide supplemental
guidance for some key terms used in this document, to improve clarity for the reader.
3.1 Terms and definitions
3.1.1
security program
SP
portfolio of security services, including integration services and maintenance services, and their
associated policies, procedures and products that are applicable to the IACS
Note 1 to entry: The SP for IACS asset owners refers to the policies and procedures defined by them to address
cybersecurity concerns of the IACS. This can include technical, process, physical and compensating security
measures used to reduce the cybersecurity attack surface.
[SOURCE: IEC 62443-2-1:—, 3.1.15]
3.1.2
security protection scheme
SPS
set of technical, physical, and process security measures designed to address cyber security
concerns of an IACS during operation
Note 1 to entry: The SP for IACS asset owners refers to the policies and procedures defined by them to address
cybersecurity concerns of the IACS. This can include technical, process, physical and compensating security
measures used to reduce the cybersecurity attack surface.
___________
Under preparation. Stage at the time of publication: IEC/FDIS 62443-2-1:2024.

3.1.3
system security requirement
security requirements based on requirements specified in IEC 62443-3-3:2013
Note 1 to entry: When applied to products, the system security requirements are specified in IEC 62443-3-3:2013.
Each requirement is formulated as "The control system shall provide the capability to …".
Note 2 to entry: When applied to automation solutions, the system security requirements are defined as "The zone
of the automation solution shall provide the capability to …", instead of "The control system shall provide the
capability to …":
Note 3 to entry: When applied to IACS in operation, the system security requirements are defined as "The IACS in
operation shall provide the capability to …", instead of "The control system shall provide the capability to …".
3.1.4
security level
measure of confidence that the IACS is free from vulnerabilities and functions in the intended
manner
Note 1 to entry: The definition of security levels is expected to evolve. In the context of this document, the security
levels are the levels to which the system security requirements are mapped to according to IEC 62443-3-3.
[SOURCE: IEC 62443-3-3:2013: 3.1.38, modified – The Note to entry has been changed.]
3.1.5
target security protection ratings
levels of the system security requirements that an asset owner desires to be fulfilled during
operation
3.1.6
implemented security protection ratings
levels of the system security requirements which can be fulfilled during implementation by the
designed technical, physical, and process security measures, under the assumption that the
process security measures will be executed during operation with a demonstrated repeatability
and effectiveness
3.1.7
operated security protection ratings
levels of system security requirements that have been fulfilled by the technical, physical, and
process security measures at a given point of time during operation, with demonstrated process
security measures that are repeatable and effective
3.1.8
maturity level
qualitative method of characterizing the capability of an organization to implement security
requirements according to documented policies and procedures and their historical
performance in doing so
Note 1 to entry: In the context of this document, maturity levels express the level of confidence that process security
measures are executed by the personnel in charge during operation of the IACS with a demonstrated repeatability
and effectiveness.
[SOURCE: IEC 62443-2-1:—, 3.1.7, modified – The Note to entry has been added.]
3.1.9
security measure
measure taken for an IACS to protect the safety, integrity, availability, and confidentiality
[SOURCE: IEC TS 62443-1-1:—, 3.1.110]

– 10 – IEC PAS 62443-2-2:2025 © IEC 2025
3.2 Abbreviated terms and acronyms
AO asset owner
CRS cybersecurity requirements specification
IACS industrial automation and control systems
IEC International Electrotechnical Commission
ISA International Society of Automation
ISO International Organization for Standardization
KPI key performance indicator
ML maturity level
MS maintenance service provider
NIST National Institute of Standards and Technology
PS product supplier
SI integration service provider
SL security level
SL-C security level capability
SP security program
SPE security program element
SPR security protection rating
SPR-I security protection rating implemented
SPR-O security protection rating operational
SPR-T security protection rating target
SPS security protection scheme
SR security requirement
SuC system under consideration

4 Relationship between this document and other documents
The document describes the activities for the design, implementation, and validation of an SPS
and the use of IEC 62443-2-1, IEC 62443-2-4, IEC 62443-3-2, IEC 62443-3-3, IEC 62443-4-1,
and IEC 62443-4-2 for supporting these activities.
The concepts described in this document are not all reflected in currently published documents
of the IEC 62443 series. None of these concepts contradicts contents of the IEC 62443
documents. They provide input for evolutions, which are expected to be reflected in further
editions of IEC 62443 series documents.

5 Security program and security protection scheme
5.1 Relationship between security program and security protection scheme
IEC 62443-2-1 specifies security program (SP) requirements for IACS asset owners. The SP of
IACS asset owners refers to technical, physical, and process security measures defined by
them to address cyber security concerns of all the IACS during their respective life cycle. The
SP can include technical, physical, and process security measures to reduce the cyber security
attack surface. The SP also includes physical measures to reduce access to the assets of the
IACS.
IEC 62443-2-1 has a requirement for the SP to implement an information security management
system ensuring the execution of actions to reduce the risks. For an asset owner, risk reduction
means the implementation of the necessary security measures for the protection of its operating
facility against cyberthreats. It is not unusual that an operating facility includes several IACS,
each of them controlling a part of the physical process. According to the criticality for the
business of the asset owner, each IACS can have different target levels for security protection.
The risk reduction actions include for each IACS the development of a set of technical, physical,
and process security measures – the security protection scheme (SPS) – to meet the required
target security protection levels. An asset owner establishing a security program ensures that
a SPS is designed and applied during operation for each IACS, involving all roles defined in the
IEC 62443 series.
The SPS life cycle is identical to the life cycle of the IACS to which the SPS is applied. In
addition to security measures applied to each IACS, the SP includes security measures to meet
corporate organization requirements of the operating facility. These are linked to the enterprise
life cycle of the operating facility which is decoupled from the IACS / SPS life cycles. Examples
of those measures are security management policies and procedures, security measurements
such as KPIs, escalation procedures, top management reports, etc.
It is necessary to align the corporate organization requirements of the operating facility with
those which apply to each IACS.
The latter leads to specific technical, physical, and process security measures for each IACS
resulting from a risk-based approach considering the criticality of the considered IACS. In the
context of IEC 62443, the asset owner role also includes the operator of each IACS. During
operation, the execution of process security measures of the SPS by the personnel in charge
are the responsibility of the asset owner.
Figure 2 illustrates the relationship between the SP and the SPS.

– 12 – IEC PAS 62443-2-2:2025 © IEC 2025

Figure 2 – Security program and security protection scheme
5.2 Process steps for the generation of a Security Protection Scheme
The primary process steps for the generation of an SPS are illustrated in Figure 3. Based on
the process steps of IEC 62443-3-2, a partitioning of the IACS in zones and conduits is
performed and the technical, physical, and process security measures are designed.
A cybersecurity requirement specification (CRS) is created for documenting the system security
requirements for each zone and conduit. These are derived from the application to a specific
IACS of the requirements of IEC 62443-2-1, to meet the tolerable cybersecurity residual risks
which are specific to the considered IACS. The system security requirements are formulated by
applying IEC 62443-3-3 requirements to zones and conduits of the IACS instead of capabilities
of control systems. They should be grouped according to the security program elements (SPEs)
and sub-SPEs defined in IEC 62443-2-1, to provide tracing to the asset owner security program
requirements. The mapping of system security requirements to levels supports the required
strength of security measures to meet the tolerable cybersecurity residual risks.
The CRS further includes enterprise, business, and operational constraints which are
considered when designing the security measures. They include but are not limited to:
• operating environment assumptions,
• physical access to the assets of the IACS,
• assumptions and external dependencies,
• demarcation between OT and IT,
• company or site-specific policies,
• standards,
• regulatory requirements,
• operational availability and performance constraints,
• safety requirements,
• cost constraints.
The process starts with a risk-based system partitioning along the process steps described in
IEC 62443-3-2, leading to zones and conduits.

For each zone and its conduits and SPE / sub-SPE, the CRS includes:
a) applicable IEC 62443-2-1 requirements,
b) derived system security requirements (IEC 62443-3-3) to meet the tolerable cybersecurity
residual risks,
c) enterprise, business, and operational constraints.
For each zone and its conduits, a set of technical, physical, and process security measures are
designed to fulfil the security requirements of the zone and its conduits. Some of the security
measures are specific to only one zone and its conduits, others are effective for several or all
zones and conduits. The SPS includes all technical, physical, and process security measures
to fulfil the security requirements of each zone and its conduits.
In general, technical security measures, including, if any, compensating technical security
measures, are not sufficient to fulfil the system security requirements during the operation of
the IACS. The technical capabilities are operated according to associated process security
measures. As the operation phase often lasts many years, these associated process security
measures significantly impact the fulfilment of the requirements. For example, the
implementation of a firewall is a technical security measure supporting the fulfilment of the
system security requirement SR 1.13 (see IEC 62443-3-3) to "monitor and control all methods
of access via untrusted networks". The security protection is given by the configured firewall
according to the asset owner’s requirements. During operation, the protection is directly
impacted by the management of the firewall configuration, which constitutes the associated
process security measures.
Figure 3 – Process steps for generating a security protection scheme

– 14 – IEC PAS 62443-2-2:2025 © IEC 2025
6 Security protection ratings
6.1 Overview
Security protection ratings (SPR) are used when assessing the fulfilment of system security
requirements by the security measures included in the Security Protection Scheme. The content
of the system security requirements, including their mapping to security levels (SL), is provided
by IEC 62443-3-3.
The goal of the SPR is to support the target risk mitigation determined for the IACS solution
during operation. Consequently, the system security requirements are defined as "The IACS in
operation shall provide the capability to …", instead of "The control system shall provide the
capability to …".
A system security requirement is assessed as fulfilled when the security measures provide the
capability to fulfil it and the organizational part of the security measures are practiced reliably.
The SPR describes the outcome of the assessment process in values from 0 to 4, which reflect
the level of compliance with the system security requirement.
The SPR value combines two parts:
a) the mapping of the considered system security requirement to the security level (SL), and
b) the repeatability to execute the organizational measures necessary to sustain the required
security measures during operation.
The first step is to evaluate the capability to fulfil the system security requirement. In many
cases the security measures necessary to provide risk mitigation are a combination of technical
measures implemented in the automation solution and organizational measures. The
organizational measures include those sustaining the technical measures, as well as
compensating risk mitigation organizational measures, if any. If the system security requirement
can be fulfilled, the SL value is equal to the mapping of the considered system security
requirement. The second part focuses on the repeatability of executing the organizational
measures necessary to sustain the required security measures. The effectiveness of these is
taken as a prerequisite and is not considered in this document. If the process security measures
are executed reliably, the SPR value is equal to the mapping of the considered system security
requirement.
System security requirements can also be fulfilled by purely organizational measures. In this
situation, the assessment focuses on the repeatability of execution. The SL and the SPR values
are equal to the mapping of the considered system security requirement if the process security
measures are executed reliably.
EXAMPLE Regarding the system security requirement SR 1.1 – which is mapped to SL 1 –, the assessor will
evaluate the fulfilment of the requirement: "The IACS in operation shall provide the capability to identify and
authenticate all human users". The SL value is equal to 1, if the technical, physical, and process security measures
provide the capability to fulfil this requirement. Fulfilment is achieved if the responsible personnel execute reliably
the organizational measures necessary for the identification and authentication of human users, thus leading to the
SPR value equal to 1.
The assessment evaluates the fulfilment of each system security requirement by one or several
security measures, resulting in either "fulfilled" or "not fulfilled". Partial fulfilment is not
considered in the determination of the SPR values but could be used to measure progress. How
fulfilment is assessed depends on the methodology, which is not specified in this document.
Any used methodology should show consistency and repeatability of the assessment results.
Annex A provides example(s) of methodologies that could be considered.

6.2 Use of the maturity model defined in IEC 62443-2-1 for the determination of SPR
values
Maturity models are commonly used to evaluate organizations regarding the ability of their
personnel to repeatably act according to defined policies and procedures. Organizations can
apply an existing model or define their own model. A maturity model to be used for the
evaluation of the repeatability of execution of the process security measures should satisfy the
following criteria, as shown in Figure 4:
• Maturity levels should be described with a clear differentiation of the levels.
• Each level should be progressively more advanced than the previous level.
• The model should include a threshold in the scale defining a repeatable execution of the
process security measures when the threshold is exceeded.

Figure 4 – Maturity model
IEC 62443-2-1 defines a maturity model that sets benchmarks for the execution of the process
security measures by the asset owner. Based on this maturity model, the definitions of the
maturity levels for the evaluation of the repeatability of execution of the process security
measures are:
ML 1: Processes are performed in an ad-hoc and often undocumented (or not fully
documented) manner. As a result, consistency over time can be difficult to be shown.
ML 2: Documentation exists and how to manage the delivery and performance of the
capability. This documentation can be in form of written procedures or written training
programs for performing the capability. There can be a significant delay between
defining a process and executing it.
ML 3: A process at Level 3 is a Level 2 process that is being practiced on the IACS. The
performance of a Level 3 practice can be shown to be repeatable over time within the
IACS.
ML 4: Using suitable process metrics, the effectiveness and/or performance improvements
of the process security measures for operation can be demonstrated. This results in a
SP that improves the process through technological / procedural / management
changes.
According to this maturity model, the threshold defining a repeatable execution of process
security measures is between ML 2 and ML 3. At ML 3, documentation exists that describes
how to execute the process security measures as well as proof on on-going repeatable
execution. This documentation can be in the form of written policies and procedures, and written
training programs that establish the basis that the practices are repeatable, even during times
of stress. When these practices are in place, measured performance, e.g., training records,
focused audits, key performance indicators, etc. provides evidence that their execution is
performed and managed according to their documented plans. The execution can be shown to
be repeatable over time within the IACS.

– 16 – IEC PAS 62443-2-2:2025 © IEC 2025
Figure 5 shows the determination of the SPR value using a matrix. The horizontal axis
represents the security level to which the considered system security requirement is mapped.
The vertical axis differentiates the maturity level for the execution of the process security
measures. The SPR value is "not defined" if there is no assurance about repeatable execution
of the process security measures.

Figure 5 – Determination of the SPR value by using the maturity model
of IEC 62443-2-1
As IACS are often operated over many years, it is important to ensure that the process security
measures are reliably practiced over time. If this is not the case, the level of protection of the
IACS during operation can be degraded. Human behaviour has a great impact on the protection
of the IACS during operation and can significantly increase attack surfaces. Referring to the
example of identification and authentication, a significant weakness is created if an authorized
human user does not handle its credentials confidentially. The reason could be that there is no
password policy prescribing the confidential handling of passwords, or that employees are not
aware of or don’t follow the policy. The ML value would be rated as less than 3. Due to this
weakness, the protection of the IACS can be significantly lowered, even if the access control
capabilities of the automation solution would allow a higher level of protection to be achieved.
Figure 6 shows the use of the SPR matrix to visualize the assessment of the fulfilment of a
system security requirement mapped at Level 3. The first step is to assess if the technical and
process security measures provide the capability to fulfil the system security requirement. This
leads to a SL value of 3 in case of a positive result. In a second step, the repeatability of
execution of the process security measures is assessed, which is reflected in the ML value.
When the maturity level is above the threshold (ML 3 or ML 4), the system security requirement
is fulfilled, which is reflected by an SPR value of 3.

Figure 6 – Example of visualizing the fulfilment of a system security
requirement with an SPR value
6.3 Use of alternative SPR matrixes for internal purposes
Some risk reduction should be available even for ML 1 and ML 2; however, it will be less than
if ML 3 or ML 4 were applicable for the same SL capability. Organizations can define for internal
purposes their own set of SPR values for ML 1 and ML 2, leading to alternative SPR matrixes
that are helpful with respect to an asset owner’s risk management program when it comes to
making recommendations intended to provide improvements. Another benefit of estimating SPR
values for all MLs is to show progress in the evolution of the organization’s maturity level.
When assigned to fields of the matrix at ML 1 and ML 2, SPR values should match the following
rules:
• For a given SL which can be matched, the SPR values should not decrease when the
maturity improves, as the maturity level reflects the reliability of the organization to use the
capabilities provided by the technical security measures during operation.
• The SPR values in the rows for ML 3 and ML 4 are equal to the corresponding SL values.
Organizations can differentiate improvements in effectiveness and performance of the
process security measures by claiming ML 4 in addition to the SPR values.
The left side of Figure 7 shows an example of a SPR matrix with SPR values fulfilling the rules.
An alternative possibility to show progress is to visualize in each field below ML 3 the SL values
which can be matched and the ML values, as illustrated in the example on the right of Figure 7.

– 18 –
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

IEC PAS 62443-2-2:2025 is a pivotal standard that addresses the security of industrial automation and control systems (IACS) through its comprehensive Security Protection Scheme (SPS). The document comprehensively details the development, validation, operation, and maintenance of a robust set of technical, physical, and process security measures. Its clear goal is to empower asset owners in implementing an effective IACS Security Program (SP) that adeptly manages the risks associated with cyberthreats to systems in operational facilities. One of the standout features of IEC PAS 62443-2-2:2025 is its alignment with the broader IEC 62443 series, which lays a solid foundation for creating a seamless security framework tailored for IACS. The synergy found in this standard facilitates the adaptation and application of existing guidelines to real-world conditions, enhancing the relevance of the measures described. By articulating how these measures can be employed to mitigate risks during the IACS operational phase, the document ensures that security protocols are not just theoretical but grounded in practical application. Moreover, the standard’s emphasis on the continuous operation and maintenance of security measures strengthens its position as a critical tool for asset owners. The iterative approach to risk management incorporated in the SPS enables organizations to remain agile in the face of evolving cyber threats, further underscoring its relevance in today's rapidly changing technological landscape. In summary, IEC PAS 62443-2-2:2025 presents an indispensable framework for the security of IACS, with its detailed guidelines and actionable measures standing as a powerful resource for organizations seeking to bolster their defenses against cyber threats. The comprehensive nature and robust applicability of the standard make it a cornerstone document for those investing in the security of industrial automation and control systems.

IEC PAS 62443-2-2:2025は、産業オートメーションおよび制御システムに対するセキュリティの確保に関する重要な指針を提供する標準です。この文書の範囲は、セキュリティ保護スキーム(SPS)の開発、検証、運用、および維持に関する具体的な手順とメカニズムを示しており、特にIACS(産業オートメーションおよび制御システム)を対象としています。 この標準の強みは、サイバー脅威に対処するためのリスク管理手法を中心に据えている点です。具体的には、IACSセキュリティプログラム(SP)を実装する資産所有者に対し、SPSの設計、実装、運用におけるリスクを効果的に管理し、サイバーセキュリティの強化を図るための具体的なメカニズムと手順を提供しています。 また、IEC 62443シリーズの他の文書で指定された内容に基づいており、これらの内容をどのように活用して、技術的、物理的、およびプロセスのセキュリティ対策を開発できるかを具体的に説明しています。このアプローチにより、運用フェーズにおけるIACSのリスクを低減し、セキュリティ体制を強化するための包括的な枠組みを提供しています。 IEC PAS 62443-2-2:2025は、産業界におけるサイバーセキュリティの重要性を体現した文書であり、特にIACSを守るための具体的なガイダンスとして、その関連性と実用性において非常に高い評価を得ています。

La norme IEC PAS 62443-2-2:2025 est un document essentiel qui traite de la sécurité des systèmes d'automatisation et de contrôle industriels, en particulier à travers son Part 2-2 qui aborde le schéma de protection de la sécurité (SPS). Son champ d'application est clair et pertinent, visant à fournir des orientations précises sur le développement, la validation, l'exploitation et la maintenance d'un ensemble de mesures de sécurité techniques, physiques et procédurales. Parmi les forces notables de cette norme, on trouve son approche systématique pour aider les propriétaires d'actifs à mettre en œuvre un programme de sécurité des systèmes d'automatisation et de contrôle industriels. Elle fournit des mécanismes et des procédures concrètes qui permettent de garantir que la conception, l'implémentation et l'exploitation d'un SPS sont bien gérées, en minimisant les risques issus des cybermenaces. Cela est particulièrement pertinent dans le contexte actuel où les cybermenaces évoluent constamment et où la protection des IACS est cruciale pour assurer la continuité des opérations industrielles. De plus, la norme s'appuie sur des contenus spécifiés dans d'autres documents de la série IEC 62443, enrichissant ainsi son contenu et son applicabilité. En expliquant comment ces contenus peuvent être utilisés pour développer des mesures de sécurité adaptées, la norme IEC PAS 62443-2-2:2025 offre une feuille de route solide pour les professionnels de la sécurité souhaitant renforcer leur dispositif de protection. La pertinence de cette norme ne peut être sous-estimée, car elle permet non seulement de gérer les risques pendant la phase d'exploitation des IACS, mais également de fournir une base pour une amélioration continue des pratiques de sécurité. Ainsi, l'IEC PAS 62443-2-2:2025 se présente comme un document incontournable pour toute organisation souhaitant solidifier sa posture de sécurité face aux menaces cybernétiques croissantes qui pèsent sur les systèmes industriels.

IEC PAS 62443-2-2:2025는 산업 자동화 및 제어 시스템을 위한 보안 표준으로, Security Protection Scheme(SPS)의 개발, 검증, 운영 및 유지 관리를 위한 지침을 제공합니다. 이 표준의 범위는 IACS(Industrial Automation and Control Systems) 보안 프로그램을 구현하는 자산 소유자에게 사이버 위협으로부터의 위험을 관리하기 위한 메커니즘과 절차를 제공하는 데 초점을 맞추고 있습니다. 이 문서는 IEC 62443 시리즈의 다른 문서에서 명시된 내용을 기반으로 하여, IACS의 운영 단계에서 발생할 수 있는 위험에 대응하는 기술적, 물리적 및 프로세스 보안 조치를 개발하는 데 어떻게 활용될 수 있는지를 설명합니다. 표준의 강점은 조직이 사이버 보안 위협에 효과적으로 대응할 수 있도록 하는 종합적이고 체계적인 접근 방식을 제공한다는 점입니다. 특히, 이 문서는 보안 보호 체계의 설계, 구현 및 운영 과정에서 발생할 수 있는 다양한 사이버 리스크를 통제하고 완화하기 위한 현장 맞춤형 해결책을 제시합니다. IEC PAS 62443-2-2:2025는 산업 자동화와 제어 시스템의 보안을 위한 필수적인 자료로, IACS의 안전하고 신뢰할 수 있는 운영을 보장하는 데 필수적입니다. 이는 기업이 현대의 사이버 위협에 보다 효율적으로 대응할 수 있는 기반을 마련해 주며, 그 중요성이 날로 증가하는 디지털 환경에서 특히 큰 의미를 지닙니다.

Die IEC PAS 62443-2-2:2025 bietet eine umfassende Anleitung zur Entwicklung, Validierung, zum Betrieb und zur Wartung eines Set von Sicherheitsmaßnahmen, die als Security Protection Scheme (SPS) bezeichnet werden. Der Umfang des Dokuments ist klar definiert und konzentriert sich auf den Schutz industrieller Automatisierungs- und Steuerungssysteme (IACS). Es adressiert die Bedürfnisse von Asset-Besitzern, die ein IACS-Sicherheitsprogramm (SP) implementieren, indem es ihnen Mechanismen und Verfahren an die Hand gibt, um sicherzustellen, dass die Gestaltung, Implementierung und der Betrieb eines SPS die Risiken, die aus Cyberbedrohungen resultieren, effektiv managen. Ein wesentlicher Vorteil des Dokuments ist seine fundierte Basis, die aus Inhalten anderer Dokumente der IEC 62443-Serie abgeleitet ist. Dies sorgt dafür, dass die IEC PAS 62443-2-2:2025 nahtlos in bestehende Standards integriert werden kann und die Konsistenz sowie die Relevanz der Sicherheitsmaßnahmen erhöht. Die Erläuterungen, wie diese Inhalte genutzt werden können, unterstützen nicht nur die technische Entwicklung, sondern auch die physischen und prozessualen Sicherheitsmaßnahmen. Dies macht das Dokument zu einer wertvollen Ressource für Organisationen, die ihre Systeme gegen aktuelle und zukünftige Cyberbedrohungen schützen möchten. Darüber hinaus behandelt die Norm spezifisch die Risiken, die während der Betriebsphase der IACS auftreten können. Diese Fokussierung auf die Betriebssicherheit ist besonders relevant in einer Zeit, in der industrielle Steuerungssysteme zunehmend Ziel von Cyberangriffen sind. Die IEC PAS 62443-2-2:2025 fördert proaktive Sicherheitsstrategien, die es Organisationen ermöglichen, potenzielle Bedrohungen frühzeitig zu erkennen und geeignete Gegenmaßnahmen zu ergreifen. Insgesamt stellt die IEC PAS 62443-2-2:2025 einen wichtigen Schritt in Richtung einer standardisierten Sicherheitsarchitektur im Bereich der industriellen Automatisierung dar. Die Norm ermöglicht eine ganzheitliche Betrachtung der Sicherheitsanforderungen und unterstützt Unternehmen dabei, die nötigen Sicherheitsvorkehrungen effizient und effektiv zu implementieren. Die Relevanz dieser Norm nimmt in Zeiten fortschreitender Digitalisierung und wachsender Cyberrisiken stetig zu und trägt entscheidend zur Sicherheitskultur innerhalb der Industrie bei.