Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels

IEC 62443-3-3:2013 provides detailed technical control system requirements (SRs) associated with the seven foundational requirements (FRs) described in IEC 62443-1-1 including defining the requirements for control system capability security levels, SL-C(control system). These requirements would be used by various members of the industrial automation and control system (IACS) community along with the defined zones and conduits for the system under consideration (SuC) while developing the appropriate control system target SL, SL-T(control system), for a specific asset. The contents of the corrigendum of April 2014 have been included in this copy.

Réseaux industriels de communication - Sécurité dans les réseaux et les systèmes - Partie 3-3: Exigences de sécurité des systèmes et niveaux de sécurité

IEC 62443-3-3:2013 fournit des exigences système (SR) de commande techniques détaillées associées aux sept exigences fondamentales (FR) décrites dans l’IEC 62443‑1‑1, y compris la définition des exigences des niveaux de sécurité de capacité du système de commande, SL C (système de commande). Ces exigences sont utilisées par plusieurs membres de la communauté des systèmes d’automatisation et de commande industrielles (IACS) ainsi que les zones et conduits définis pour le système à l'étude (SuC), tout en développant le SL cible du système de commande approprié, SL-T (système de commande) pour un actif spécifique. Le contenu du corrigendum d’avril 2014 est inclus dans la présente copie.

General Information

Status
Published
Publication Date
06-Aug-2013
Drafting Committee
WG 10 - TC 65/WG 10
Current Stage
PPUB - Publication issued
Start Date
07-Aug-2013
Completion Date
15-Sep-2013

Relations

Effective Date
05-Sep-2023

Overview

IEC 62443-3-3:2013 - Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels - defines detailed technical requirements for industrial control systems. It maps the seven Foundational Requirements (FRs) introduced in IEC 62443-1-1 to concrete System Requirements (SRs) and describes control system capability security levels (SL‑C) used to derive target security levels (SL‑T) for specific assets and zones/conduits. This edition includes the April 2014 corrigendum.

Keywords: IEC 62443-3-3, industrial cybersecurity, IACS security, control system security, security levels, zones and conduits, SRs, SL‑C, SL‑T.

Key Topics and Technical Requirements

IEC 62443-3-3 provides prescriptive, technical controls to secure IACS components and networks. Key topics covered in the standard include:

  • Identification & Authentication (FR‑1)

    • SRs such as SR 1.1 (human user identification and authentication), SR 1.2 (software/device identification), account and authenticator management, PKI certificates and password strength.
  • Use Control (FR‑2)

    • Authorization enforcement, session lock/remote session termination, concurrent session control, mobile code and portable device controls.
  • Audit & Accountability (FR‑2 related SRs)

    • Auditable events, audit storage capacity, timestamps, response to audit failures, and non‑repudiation mechanisms.
  • Network and System Constraints

    • Support of essential functions, compensating countermeasures, least privilege, and controls for wireless and untrusted network access.
  • Security Levels and Requirement Enhancements

    • Definition of SL‑C variants and guidance on requirement enhancements per security level to guide design and procurement.

The standard organizes requirements by SR number and provides rationale, supplemental guidance and security level mappings for each SR.

Practical Applications and Who Uses It

IEC 62443-3-3 is intended for the industrial automation and control system (IACS) community and is practically used by:

  • Asset owners / operators to define target security levels (SL‑T) for assets, zones and conduits and to set technical baselines.
  • System integrators and OT engineers when designing and implementing secure control system architectures and selecting controls that meet SRs.
  • Product vendors to build devices and software aligned with SL‑C expectations and to supply documented security features.
  • Security architects, auditors and compliance teams for gap analysis, procurement specifications, testing criteria and compliance verification.

Common use cases: zone/conduit design, technical requirement specification in procurement, risk-based selection of controls, and verification of security capabilities for controllers, HMIs and network components.

Related Standards (if applicable)

  • IEC 62443 series (e.g., IEC 62443‑1‑1 for FR definitions) - IEC 62443‑3‑3 is part of this suite and works with other parts to provide a comprehensive IACS cybersecurity framework.
  • Often used alongside broader IT/IS management standards in governance and compliance programs.

For implementation, consult the full IEC 62443-3-3 document (including corrigendum) and coordinate with other IEC 62443 parts to cover organizational, procedural and system-level requirements.

Standard

IEC 62443-3-3:2013 - Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels Released:8/7/2013 Isbn:9782832210369

English language
80 pages
sale 15% off
Preview
sale 15% off
Preview
Standard

IEC 62443-3-3:2013 - Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels

English and French language
170 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

IEC 62443-3-3:2013 is a standard published by the International Electrotechnical Commission (IEC). Its full title is "Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels". This standard covers: IEC 62443-3-3:2013 provides detailed technical control system requirements (SRs) associated with the seven foundational requirements (FRs) described in IEC 62443-1-1 including defining the requirements for control system capability security levels, SL-C(control system). These requirements would be used by various members of the industrial automation and control system (IACS) community along with the defined zones and conduits for the system under consideration (SuC) while developing the appropriate control system target SL, SL-T(control system), for a specific asset. The contents of the corrigendum of April 2014 have been included in this copy.

IEC 62443-3-3:2013 provides detailed technical control system requirements (SRs) associated with the seven foundational requirements (FRs) described in IEC 62443-1-1 including defining the requirements for control system capability security levels, SL-C(control system). These requirements would be used by various members of the industrial automation and control system (IACS) community along with the defined zones and conduits for the system under consideration (SuC) while developing the appropriate control system target SL, SL-T(control system), for a specific asset. The contents of the corrigendum of April 2014 have been included in this copy.

IEC 62443-3-3:2013 is classified under the following ICS (International Classification for Standards) categories: 25.040.40 - Industrial process measurement and control; 35.110 - Networking. The ICS classification helps identify the subject area and facilitates finding related standards.

IEC 62443-3-3:2013 has the following relationships with other standards: It is inter standard links to IEC 62443-3-3:2013/COR1:2014. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

You can purchase IEC 62443-3-3:2013 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of IEC standards.

Standards Content (Sample)


IEC 62443-3-3 ®
Edition 1.0 2013-08
INTERNATIONAL
STANDARD
colour
inside
Industrial communication networks – Network and system security –
Part 3-3: System security requirements and security levels

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester.
If you have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication,
please contact the address below or your local IEC member National Committee for further information.

IEC Central Office Tel.: +41 22 919 02 11
3, rue de Varembé Fax: +41 22 919 03 00
CH-1211 Geneva 20 info@iec.ch
Switzerland www.iec.ch
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.

About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigenda or an amendment might have been published.

Useful links:
IEC publications search - www.iec.ch/searchpub Electropedia - www.electropedia.org
The advanced search enables you to find IEC publications The world's leading online dictionary of electronic and
by a variety of criteria (reference number, text, technical electrical terms containing more than 30 000 terms and
committee,…). definitions in English and French, with equivalent terms in
It also gives information on projects, replaced and additional languages. Also known as the International
withdrawn publications. Electrotechnical Vocabulary (IEV) on-line.

IEC Just Published - webstore.iec.ch/justpublished Customer Service Centre - webstore.iec.ch/csc
Stay up to date on all new IEC publications. Just Published If you wish to give us your feedback on this publication
details all new publications released. Available on-line and or need further assistance, please contact the
also once a month by email. Customer Service Centre: csc@iec.ch.

IEC 62443-3-3 ®
Edition 1.0 2013-08
INTERNATIONAL
STANDARD
colour
inside
Industrial communication networks – Network and system security –

Part 3-3: System security requirements and security levels

INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
PRICE CODE
XC
ICS 25.040.40; 35.110 ISBN 978-2-8322-1036-9

– 2 – 62443-3-3 © IEC:2013(E)
CONTENTS
FOREWORD . 9
0 Introduction . 11
0.1 Overview . 11
0.2 Purpose and intended audience . 12
0.3 Usage within other parts of the IEC 62443 series . 12
1 Scope . 14
2 Normative references . 14
3 Terms, definitions, abbreviated terms, acronyms, and conventions . 14
3.1 Terms and definitions . 14
3.2 Abbreviated terms and acronyms . 20
3.3 Conventions . 22
4 Common control system security constraints . 22
4.1 Overview . 22
4.2 Support of essential functions . 23
4.3 Compensating countermeasures . 23
4.4 Least privilege . 24
5 FR 1 – Identification and authentication control . 24
5.1 Purpose and SL-C(IAC) descriptions . 24
5.2 Rationale . 24
5.3 SR 1.1 – Human user identification and authentication . 24
5.3.1 Requirement . 24
5.3.2 Rationale and supplemental guidance . 24
5.3.3 Requirement enhancements . 25
5.3.4 Security levels . 25
5.4 SR 1.2 – Software process and device identification and authentication . 26
5.4.1 Requirement . 26
5.4.2 Rationale and supplemental guidance . 26
5.4.3 Requirement enhancements . 26
5.4.4 Security levels . 27
5.5 SR 1.3 – Account management . 27
5.5.1 Requirement . 27
5.5.2 Rationale and supplemental guidance . 27
5.5.3 Requirement enhancements . 27
5.5.4 Security levels . 27
5.6 SR 1.4 – Identifier management . 28
5.6.1 Requirement . 28
5.6.2 Rationale and supplemental guidance . 28
5.6.3 Requirement enhancements . 28
5.6.4 Security levels . 28
5.7 SR 1.5 – Authenticator management . 28
5.7.1 Requirement . 28
5.7.2 Rationale and supplemental guidance . 28
5.7.3 Requirement enhancements . 29
5.7.4 Security levels . 29
5.8 SR 1.6 – Wireless access management . 30
5.8.1 Requirement . 30

62443-3-3 © IEC:2013(E) – 3 –
5.8.2 Rationale and supplemental guidance . 30
5.8.3 Requirement enhancements . 30
5.8.4 Security levels . 30
5.9 SR 1.7 – Strength of password-based authentication . 30
5.9.1 Requirement . 30
5.9.2 Rationale and supplemental guidance . 30
5.9.3 Requirement enhancements . 31
5.9.4 Security levels . 31
5.10 SR 1.8 – Public key infrastructure (PKI) certificates . 31
5.10.1 Requirement . 31
5.10.2 Rationale and supplemental guidance . 31
5.10.3 Requirement enhancements . 32
5.10.4 Security levels . 32
5.11 SR 1.9 – Strength of public key authentication . 32
5.11.1 Requirement . 32
5.11.2 Rationale and supplemental guidance . 32
5.11.3 Requirement enhancements . 33
5.11.4 Security levels . 33
5.12 SR 1.10 – Authenticator feedback . 33
5.12.1 Requirement . 33
5.12.2 Rationale and supplemental guidance . 33
5.12.3 Requirement enhancements . 33
5.12.4 Security levels . 33
5.13 SR 1.11 – Unsuccessful login attempts . 34
5.13.1 Requirement . 34
5.13.2 Rationale and supplemental guidance . 34
5.13.3 Requirement enhancements . 34
5.13.4 Security levels . 34
5.14 SR 1.12 – System use notification . 34
5.14.1 Requirement . 34
5.14.2 Rationale and supplemental guidance . 34
5.14.3 Requirement enhancements . 35
5.14.4 Security levels . 35
5.15 SR 1.13 – Access via untrusted networks . 35
5.15.1 Requirement . 35
5.15.2 Rationale and supplemental guidance . 35
5.15.3 Requirement enhancements . 35
5.15.4 Security levels . 35
6 FR 2 – Use control . 36
6.1 Purpose and SL-C(UC) descriptions . 36
6.2 Rationale . 36
6.3 SR 2.1 – Authorization enforcement . 36
6.3.1 Requirement . 36
6.3.2 Rationale and supplemental guidance . 36
6.3.3 Requirement enhancements . 37
6.3.4 Security levels . 37
6.4 SR 2.2 – Wireless use control . 37
6.4.1 Requirement . 37
6.4.2 Rationale and supplemental guidance . 38

– 4 – 62443-3-3 © IEC:2013(E)
6.4.3 Requirement enhancements . 38
6.4.4 Security levels . 38
6.5 SR 2.3 – Use control for portable and mobile devices . 38
6.5.1 Requirement . 38
6.5.2 Rationale and supplemental guidance . 38
6.5.3 Requirement enhancements . 39
6.5.4 Security levels . 39
6.6 SR 2.4 – Mobile code . 39
6.6.1 Requirement . 39
6.6.2 Rationale and supplemental guidance . 39
6.6.3 Requirement enhancements . 39
6.6.4 Security levels . 39
6.7 SR 2.5 – Session lock . 40
6.7.1 Requirement . 40
6.7.2 Rationale and supplemental guidance . 40
6.7.3 Requirement enhancements . 40
6.7.4 Security levels . 40
6.8 SR 2.6 – Remote session termination . 40
6.8.1 Requirement . 40
6.8.2 Rationale and supplemental guidance . 40
6.8.3 Requirement enhancements . 40
6.8.4 Security levels . 41
6.9 SR 2.7 – Concurrent session control . 41
6.9.1 Requirement . 41
6.9.2 Rationale and supplemental guidance . 41
6.9.3 Requirement enhancements . 41
6.9.4 Security levels . 41
6.10 SR 2.8 – Auditable events . 41
6.10.1 Requirement . 41
6.10.2 Rationale and supplemental guidance . 41
6.10.3 Requirement enhancements . 42
6.10.4 Security levels . 42
6.11 SR 2.9 – Audit storage capacity. 42
6.11.1 Requirement . 42
6.11.2 Rationale and supplemental guidance . 42
6.11.3 Requirement enhancements . 42
6.11.4 Security levels . 43
6.12 SR 2.10 – Response to audit processing failures . 43
6.12.1 Requirement . 43
6.12.2 Rationale and supplemental guidance . 43
6.12.3 Requirement enhancements . 43
6.12.4 Security levels . 43
6.13 SR 2.11 – Timestamps . 43
6.13.1 Requirement . 43
6.13.2 Rationale and supplemental guidance . 43
6.13.3 Requirement enhancements . 44
6.13.4 Security levels . 44
6.14 SR 2.12 – Non-repudiation . 44
6.14.1 Requirement . 44

62443-3-3 © IEC:2013(E) – 5 –
6.14.2 Rationale and supplemental guidance . 44
6.14.3 Requirement enhancements . 44
6.14.4 Security levels . 44
7 FR 3 – System integrity . 45
7.1 Purpose and SL-C(SI) descriptions . 45
7.2 Rationale . 45
7.3 SR 3.1 – Communication integrity. 45
7.3.1 Requirement . 45
7.3.2 Rationale and supplemental guidance . 45
7.3.3 Requirement enhancements . 46
7.3.4 Security levels . 46
7.4 SR 3.2 – Malicious code protection . 46
7.4.1 Requirement . 46
7.4.2 Rationale and supplemental guidance . 46
7.4.3 Requirement enhancements . 47
7.4.4 Security levels . 47
7.5 SR 3.3 – Security functionality verification . 47
7.5.1 Requirement . 47
7.5.2 Rationale and supplemental guidance . 47
7.5.3 Requirement enhancements . 48
7.5.4 Security levels . 48
7.6 SR 3.4 – Software and information integrity . 48
7.6.1 Requirement . 48
7.6.2 Rationale and supplemental guidance . 48
7.6.3 Requirement enhancements . 49
7.6.4 Security levels . 49
7.7 SR 3.5 – Input validation . 49
7.7.1 Requirement . 49
7.7.2 Rationale and supplemental guidance . 49
7.7.3 Requirement enhancements . 49
7.7.4 Security levels . 49
7.8 SR 3.6 – Deterministic output . 50
7.8.1 Requirement . 50
7.8.2 Rationale and supplemental guidance . 50
7.8.3 Requirement enhancements . 50
7.8.4 Security levels . 50
7.9 SR 3.7 – Error handling . 50
7.9.1 Requirement . 50
7.9.2 Rationale and supplemental guidance . 50
7.9.3 Requirement enhancements . 50
7.9.4 Security levels . 51
7.10 SR 3.8 – Session integrity . 51
7.10.1 Requirement . 51
7.10.2 Rationale and supplemental guidance . 51
7.10.3 Requirement enhancements . 51
7.10.4 Security levels . 51
7.11 SR 3.9 – Protection of audit information . 52
7.11.1 Requirement . 52
7.11.2 Rationale and supplemental guidance . 52

– 6 – 62443-3-3 © IEC:2013(E)
7.11.3 Requirement enhancements . 52
7.11.4 Security levels . 52
8 FR 4 – Data confidentiality . 52
8.1 Purpose and SL-C(DC) descriptions . 52
8.2 Rationale . 52
8.3 SR 4.1 – Information confidentiality . 53
8.3.1 Requirement . 53
8.3.2 Rationale and supplemental guidance . 53
8.3.3 Requirement enhancements . 53
8.3.4 Security levels . 53
8.4 SR 4.2 – Information persistence . 54
8.4.1 Requirement . 54
8.4.2 Rationale and supplemental guidance . 54
8.4.3 Requirement enhancements . 54
8.4.4 Security levels . 54
8.5 SR 4.3 – Use of cryptography . 54
8.5.1 Requirement . 54
8.5.2 Rationale and supplemental guidance . 55
8.5.3 Requirement enhancements . 55
8.5.4 Security levels . 55
9 FR 5 – Restricted data flow . 55
9.1 Purpose and SL-C(RDF) descriptions . 55
9.2 Rationale . 55
9.3 SR 5.1 – Network segmentation . 56
9.3.1 Requirement . 56
9.3.2 Rationale and supplemental guidance . 56
9.3.3 Requirement enhancements . 56
9.3.4 Security levels . 57
9.4 SR 5.2 – Zone boundary protection . 57
9.4.1 Requirement . 57
9.4.2 Rationale and supplemental guidance . 57
9.4.3 Requirement enhancements . 57
9.4.4 Security levels . 58
9.5 SR 5.3 – General purpose person-to-person communication restrictions . 58
9.5.1 Requirement . 58
9.5.2 Rationale and supplemental guidance . 58
9.5.3 Requirement enhancements . 58
9.5.4 Security levels . 59
9.6 SR 5.4 – Application partitioning. 59
9.6.1 Requirement . 59
9.6.2 Rationale and supplemental guidance . 59
9.6.3 Requirement enhancements . 59
9.6.4 Security levels . 59
10 FR 6 – Timely response to events . 59
10.1 Purpose and SL-C(TRE) descriptions . 59
10.2 Rationale . 60
10.3 SR 6.1 – Audit log accessibility . 60
10.3.1 Requirement . 60
10.3.2 Rationale and supplemental guidance . 60

62443-3-3 © IEC:2013(E) – 7 –
10.3.3 Requirement enhancements . 60
10.3.4 Security levels . 60
10.4 SR 6.2 – Continuous monitoring . 60
10.4.1 Requirement . 60
10.4.2 Rationale and supplemental guidance . 60
10.4.3 Requirement enhancements . 61
10.4.4 Security levels . 61
11 FR 7 – Resource availability . 61
11.1 Purpose and SL-C(RA) descriptions . 61
11.2 Rationale . 61
11.3 SR 7.1 – Denial of service protection . 62
11.3.1 Requirement . 62
11.3.2 Rationale and supplemental guidance . 62
11.3.3 Requirement enhancements . 62
11.3.4 Security levels . 62
11.4 SR 7.2 – Resource management . 62
11.4.1 Requirement . 62
11.4.2 Rationale and supplemental guidance . 62
11.4.3 Requirement enhancements . 62
11.4.4 Security levels . 63
11.5 SR 7.3 – Control system backup . 63
11.5.1 Requirement . 63
11.5.2 Rationale and supplemental guidance . 63
11.5.3 Requirement enhancements . 63
11.5.4 Security levels . 63
11.6 SR 7.4 – Control system recovery and reconstitution . 63
11.6.1 Requirement . 63
11.6.2 Rationale and supplemental guidance . 63
11.6.3 Requirement enhancements . 64
11.6.4 Security levels . 64
11.7 SR 7.5 – Emergency power . 64
11.7.1 Requirement . 64
11.7.2 Rationale and supplemental guidance . 64
11.7.3 Requirement enhancements . 64
11.7.4 Security levels . 64
11.8 SR 7.6 – Network and security configuration settings . 64
11.8.1 Requirement . 64
11.8.2 Rationale and supplemental guidance . 64
11.8.3 Requirement enhancements . 65
11.8.4 Security levels . 65
11.9 SR 7.7 – Least functionality . 65
11.9.1 Requirement . 65
11.9.2 Rationale and supplemental guidance . 65
11.9.3 Requirement enhancements . 65
11.9.4 Security levels . 65
11.10 SR 7.8 – Control system component inventory . 66
11.10.1 Requirement . 66
11.10.2 Rationale and supplemental guidance . 66
11.10.3 Requirement enhancements . 66

– 8 – 62443-3-3 © IEC:2013(E)
11.10.4 Security levels . 66
Annex A (informative) Discussion of the SL vector . 67
Annex B (informative) Mapping of SRs and REs to FR SL levels 1-4 . 75
Bibliography . 79

Figure 1 – Structure of the IEC 62443 series . 13
Figure A.1 – High-level process-industry example showing zones and conduits . 69
Figure A.2 – High-level manufacturing example showing zones and conduits . 70
Figure A.3 – Schematic of correlation of the use of different SL types . 71

Table B.1 – Mapping of SRs and REs to FR SL levels 1-4 (1 of 4) . 75

62443-3-3 © IEC:2013(E) – 9 –
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
INDUSTRIAL COMMUNICATION NETWORKS –
NETWORK AND SYSTEM SECURITY –
Part 3-3: System security requirements and security levels

FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
International Standard IEC 62443-3-3 has been prepared by IEC technical committee 65:
Industrial-process measurement, control and automation.
The text of this standard is based on the following documents:
FDIS Report on voting
65/531/FDIS 65/540/RVD
Full information on the voting for the approval of this standard can be found in the report on
voting indicated in the above table.
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2.

– 10 – 62443-3-3 © IEC:2013(E)
A list of all parts in the IEC 62443 series, published under the general title Industrial
communication networks – Network and system security, can be found on the IEC website.
The committee has decided that the contents of this publication will remain unchanged until
the stability date indicated on the IEC web site under "http://webstore.iec.ch" in the data
related to the specific publication. At this date, the publication will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
A bilingual version of this publication may be issued at a later date.
The contents of the corrigendum of April 2014 have been included in this copy.

IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates
that it contains colours which are considered to be useful for the correct
understanding of its contents. Users should therefore print this document using a
colour printer.
62443-3-3 © IEC:2013(E) – 11 –
0 Introduction
0.1 Overview
NOTE 1 This standard is part of series of standards that addresses the issue of security for industrial automation
and control systems (IACS). It has been developed by working group 4, task group 2 of the IEC99 committee in
cooperation with IEC TC65/WG10. This document prescribes the security requirements for control systems related
to the seven foundational requirements defined in IEC 62443‑1‑1 and assigns system security levels (SLs) to the
system under consideration (SuC).
NOTE 2 The format of this standard follows the ISO/IEC requirements discussed in ISO/IEC Directives, Part 2
[11]. These directives specify the format of the standard as well as the use of terms like “shall”, “should”, and
“may”. The requirements specified in normative clauses use the conventions discussed in Appendix H of the
ISO/IEC Directives.
Industrial automation and control system (IACS) organizations increasingly use commercial-
off-the-shelf (COTS) networked devices that are inexpensive, efficient and highly automated.
Control systems are also increasingly interconnected with non-IACS networks for valid
business reasons. These devices, open networking technologies and increased connectivity
provide an increased opportunity for cyber attack against control system hardware and
software. That weakness may lead to health, safety and environmental (HSE), financial and/or
reputational consequences in deployed control systems.
Organizations deploying business information technology (IT) cyber security solutions to
address IACS security may not fully comprehend the results of this decision. While many
business IT applications and security solutions can be applied to IACS, they need to be
applied in an appropriate way to eliminate inadvertent consequences. For this reason, the
approach used to define system requirements needs to be based on a combination of
functional requirements and risk assessment, often including an awareness of operational
issues as well.
IACS security measures should not have the potential to cause loss of essential services and
functions, including emergency proce
...


IEC 62443-3-3 ®
Edition 1.0 2013-08
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Industrial communication networks – Network and system security –
Part 3-3: System security requirements and security levels

Réseaux industriels de communication – Sécurité dans les réseaux et les
systèmes –
Partie 3-3: Exigences de sécurité des systèmes et niveaux de sécurité

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.

Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite
ni utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie
et les microfilms, sans l'accord écrit de l'IEC ou du Comité national de l'IEC du pays du demandeur. Si vous avez des
questions sur le copyright de l'IEC ou si vous désirez obtenir des droits supplémentaires sur cette publication, utilisez
les coordonnées ci-après ou contactez le Comité national de l'IEC de votre pays de résidence.

IEC Central Office Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.

About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigendum or an amendment might have been published.

IEC publications search - webstore.iec.ch/advsearchform Electropedia - www.electropedia.org
The advanced search enables to find IEC publications by a The world's leading online dictionary on electrotechnology,
variety of criteria (reference number, text, technical containing more than 22 000 terminological entries in English
committee,…). It also gives information on projects, replaced and French, with equivalent terms in 16 additional languages.
and withdrawn publications. Also known as the International Electrotechnical Vocabulary

(IEV) online.
IEC Just Published - webstore.iec.ch/justpublished
Stay up to date on all new IEC publications. Just Published IEC Glossary - std.iec.ch/glossary
details all new publications released. Available online and 67 000 electrotechnical terminology entries in English and
once a month by email. French extracted from the Terms and Definitions clause of
IEC publications issued since 2002. Some entries have been
IEC Customer Service Centre - webstore.iec.ch/csc collected from earlier publications of IEC TC 37, 77, 86 and
If you wish to give us your feedback on this publication or CISPR.

need further assistance, please contact the Customer Service

Centre: sales@iec.ch.
A propos de l'IEC
La Commission Electrotechnique Internationale (IEC) est la première organisation mondiale qui élabore et publie des
Normes internationales pour tout ce qui a trait à l'électricité, à l'électronique et aux technologies apparentées.

A propos des publications IEC
Le contenu technique des publications IEC est constamment revu. Veuillez vous assurer que vous possédez l’édition la
plus récente, un corrigendum ou amendement peut avoir été publié.

Recherche de publications IEC - Electropedia - www.electropedia.org
webstore.iec.ch/advsearchform Le premier dictionnaire d'électrotechnologie en ligne au
La recherche avancée permet de trouver des publications IEC monde, avec plus de 22 000 articles terminologiques en
en utilisant différents critères (numéro de référence, texte, anglais et en français, ainsi que les termes équivalents dans
comité d’études,…). Elle donne aussi des informations sur les 16 langues additionnelles. Egalement appelé Vocabulaire
projets et les publications remplacées ou retirées. Electrotechnique International (IEV) en ligne.

IEC Just Published - webstore.iec.ch/justpublished Glossaire IEC - std.iec.ch/glossary
Restez informé sur les nouvelles publications IEC. Just 67 000 entrées terminologiques électrotechniques, en anglais
Published détaille les nouvelles publications parues. et en français, extraites des articles Termes et Définitions des
Disponible en ligne et une fois par mois par email. publications IEC parues depuis 2002. Plus certaines entrées
antérieures extraites des publications des CE 37, 77, 86 et
Service Clients - webstore.iec.ch/csc CISPR de l'IEC.

Si vous désirez nous donner des commentaires sur cette
publication ou si vous avez des questions contactez-nous:
sales@iec.ch.
IEC 62443-3-3 ®
Edition 1.0 2013-08
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Industrial communication networks – Network and system security –

Part 3-3: System security requirements and security levels

Réseaux industriels de communication – Sécurité dans les réseaux et les

systèmes –
Partie 3-3: Exigences de sécurité des systèmes et niveaux de sécurité

INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
INTERNATIONALE
ICS 25.040.40; 35.110 ISBN 978-2-8322-6422-5

– 2 – IEC 62443-3-3:2013 © IEC 2013
CONTENTS
CONTENTS . 2
FOREWORD . 9
0 Introduction . 11
0.1 Overview. 11
0.2 Purpose and intended audience . 12
0.3 Usage within other parts of the IEC 62443 series . 12
1 Scope . 14
2 Normative references . 14
3 Terms, definitions, abbreviated terms, acronyms, and conventions . 14
3.1 Terms and definitions . 14
3.2 Abbreviated terms and acronyms . 20
3.3 Conventions . 22
4 Common control system security constraints . 22
4.1 Overview. 22
4.2 Support of essential functions . 23
4.3 Compensating countermeasures . 23
4.4 Least privilege . 24
5 FR 1 – Identification and authentication control . 24
5.1 Purpose and SL-C(IAC) descriptions . 24
5.2 Rationale . 24
5.3 SR 1.1 – Human user identification and authentication . 24
5.3.1 Requirement . 24
5.3.2 Rationale and supplemental guidance. 24
5.3.3 Requirement enhancements . 25
5.3.4 Security levels . 25
5.4 SR 1.2 – Software process and device identification and authentication . 26
5.4.1 Requirement . 26
5.4.2 Rationale and supplemental guidance. 26
5.4.3 Requirement enhancements . 26
5.4.4 Security levels . 27
5.5 SR 1.3 – Account management . 27
5.5.1 Requirement . 27
5.5.2 Rationale and supplemental guidance. 27
5.5.3 Requirement enhancements . 27
5.5.4 Security levels . 27
5.6 SR 1.4 – Identifier management . 28
5.6.1 Requirement . 28
5.6.2 Rationale and supplemental guidance. 28
5.6.3 Requirement enhancements . 28
5.6.4 Security levels . 28
5.7 SR 1.5 – Authenticator management . 28
5.7.1 Requirement . 28
5.7.2 Rationale and supplemental guidance. 28
5.7.3 Requirement enhancements . 29
5.7.4 Security levels . 29
5.8 SR 1.6 – Wireless access management . 30

5.8.1 Requirement . 30
5.8.2 Rationale and supplemental guidance. 30
5.8.3 Requirement enhancements . 30
5.8.4 Security levels . 30
5.9 SR 1.7 – Strength of password-based authentication . 30
5.9.1 Requirement . 30
5.9.2 Rationale and supplemental guidance. 30
5.9.3 Requirement enhancements . 31
5.9.4 Security levels . 31
5.10 SR 1.8 – Public key infrastructure (PKI) certificates . 31
5.10.1 Requirement . 31
5.10.2 Rationale and supplemental guidance. 31
5.10.3 Requirement enhancements . 32
5.10.4 Security levels . 32
5.11 SR 1.9 – Strength of public key authentication . 32
5.11.1 Requirement . 32
5.11.2 Rationale and supplemental guidance. 32
5.11.3 Requirement enhancements . 33
5.11.4 Security levels . 33
5.12 SR 1.10 – Authenticator feedback . 33
5.12.1 Requirement . 33
5.12.2 Rationale and supplemental guidance. 33
5.12.3 Requirement enhancements . 33
5.12.4 Security levels . 33
5.13 SR 1.11 – Unsuccessful login attempts . 34
5.13.1 Requirement . 34
5.13.2 Rationale and supplemental guidance. 34
5.13.3 Requirement enhancements . 34
5.13.4 Security levels . 34
SR 1.12 – System use notification . 34
5.14
5.14.1 Requirement . 34
5.14.2 Rationale and supplemental guidance. 34
5.14.3 Requirement enhancements . 35
5.14.4 Security levels . 35
5.15 SR 1.13 – Access via untrusted networks . 35
5.15.1 Requirement . 35
5.15.2 Rationale and supplemental guidance. 35
5.15.3 Requirement enhancements . 35
5.15.4 Security levels . 35
6 FR 2 – Use control. 36
6.1 Purpose and SL-C(UC) descriptions . 36
6.2 Rationale . 36
6.3 SR 2.1 – Authorization enforcement . 36
6.3.1 Requirement . 36
6.3.2 Rationale and supplemental guidance. 36
6.3.3 Requirement enhancements . 37
6.3.4 Security levels . 37
6.4 SR 2.2 – Wireless use control . 37
6.4.1 Requirement . 37

– 4 – IEC 62443-3-3:2013 © IEC 2013
6.4.2 Rationale and supplemental guidance. 38
6.4.3 Requirement enhancements . 38
6.4.4 Security levels . 38
6.5 SR 2.3 – Use control for portable and mobile devices . 38
6.5.1 Requirement . 38
6.5.2 Rationale and supplemental guidance. 38
6.5.3 Requirement enhancements . 39
6.5.4 Security levels . 39
6.6 SR 2.4 – Mobile code . 39
6.6.1 Requirement . 39
6.6.2 Rationale and supplemental guidance. 39
6.6.3 Requirement enhancements . 39
6.6.4 Security levels . 39
6.7 SR 2.5 – Session lock . 40
6.7.1 Requirement . 40
6.7.2 Rationale and supplemental guidance. 40
6.7.3 Requirement enhancements . 40
6.7.4 Security levels . 40
6.8 SR 2.6 – Remote session termination . 40
6.8.1 Requirement . 40
6.8.2 Rationale and supplemental guidance. 40
6.8.3 Requirement enhancements . 40
6.8.4 Security levels . 41
SR 2.7 – Concurrent session control . 41
6.9
6.9.1 Requirement . 41
6.9.2 Rationale and supplemental guidance. 41
6.9.3 Requirement enhancements . 41
6.9.4 Security levels . 41
6.10 SR 2.8 – Auditable events . 41
6.10.1 Requirement . 41
6.10.2 Rationale and supplemental guidance. 41
6.10.3 Requirement enhancements . 42
6.10.4 Security levels . 42
6.11 SR 2.9 – Audit storage capacity . 42
6.11.1 Requirement . 42
6.11.2 Rationale and supplemental guidance. 42
6.11.3 Requirement enhancements . 42
6.11.4 Security levels . 43
6.12 SR 2.10 – Response to audit processing failures . 43
6.12.1 Requirement . 43
6.12.2 Rationale and supplemental guidance. 43
6.12.3 Requirement enhancements . 43
6.12.4 Security levels . 43
6.13 SR 2.11 – Timestamps . 43
6.13.1 Requirement . 43
6.13.2 Rationale and supplemental guidance. 43
6.13.3 Requirement enhancements . 44
6.13.4 Security levels . 44
6.14 SR 2.12 – Non-repudiation . 44

6.14.1 Requirement . 44
6.14.2 Rationale and supplemental guidance. 44
6.14.3 Requirement enhancements . 44
6.14.4 Security levels . 44
7 FR 3 – System integrity . 45
7.1 Purpose and SL-C(SI) descriptions . 45
7.2 Rationale . 45
7.3 SR 3.1 – Communication integrity . 45
7.3.1 Requirement . 45
7.3.2 Rationale and supplemental guidance. 45
7.3.3 Requirement enhancements . 46
7.3.4 Security levels . 46
7.4 SR 3.2 – Malicious code protection . 46
7.4.1 Requirement . 46
7.4.2 Rationale and supplemental guidance. 46
7.4.3 Requirement enhancements . 47
7.4.4 Security levels . 47
7.5 SR 3.3 – Security functionality verification . 47
7.5.1 Requirement . 47
7.5.2 Rationale and supplemental guidance. 47
7.5.3 Requirement enhancements . 48
7.5.4 Security levels . 48
7.6 SR 3.4 – Software and information integrity . 48
7.6.1 Requirement . 48
7.6.2 Rationale and supplemental guidance. 48
7.6.3 Requirement enhancements . 49
7.6.4 Security levels . 49
SR 3.5 – Input validation . 49
7.7
7.7.1 Requirement . 49
7.7.2 Rationale and supplemental guidance. 49
7.7.3 Requirement enhancements . 49
7.7.4 Security levels . 49
7.8 SR 3.6 – Deterministic output . 50
7.8.1 Requirement . 50
7.8.2 Rationale and supplemental guidance. 50
7.8.3 Requirement enhancements . 50
7.8.4 Security levels . 50
7.9 SR 3.7 – Error handling . 50
7.9.1 Requirement . 50
7.9.2 Rationale and supplemental guidance. 50
7.9.3 Requirement enhancements . 50
7.9.4 Security levels . 51
7.10 SR 3.8 – Session integrity . 51
7.10.1 Requirement . 51
7.10.2 Rationale and supplemental guidance. 51
7.10.3 Requirement enhancements . 51
7.10.4 Security levels . 51
7.11 SR 3.9 – Protection of audit information . 52
7.11.1 Requirement . 52

– 6 – IEC 62443-3-3:2013 © IEC 2013
7.11.2 Rationale and supplemental guidance. 52
7.11.3 Requirement enhancements . 52
7.11.4 Security levels . 52
8 FR 4 – Data confidentiality. 52
8.1 Purpose and SL-C(DC) descriptions . 52
8.2 Rationale . 52
8.3 SR 4.1 – Information confidentiality . 53
8.3.1 Requirement . 53
8.3.2 Rationale and supplemental guidance. 53
8.3.3 Requirement enhancements . 53
8.3.4 Security levels . 53
8.4 SR 4.2 – Information persistence . 54
8.4.1 Requirement . 54
8.4.2 Rationale and supplemental guidance. 54
8.4.3 Requirement enhancements . 54
8.4.4 Security levels . 54
8.5 SR 4.3 – Use of cryptography . 54
8.5.1 Requirement . 54
8.5.2 Rationale and supplemental guidance. 55
8.5.3 Requirement enhancements . 55
8.5.4 Security levels . 55
FR 5 – Restricted data flow . 55
9.1 Purpose and SL-C(RDF) descriptions . 55
9.2 Rationale . 55
9.3 SR 5.1 – Network segmentation . 56
9.3.1 Requirement . 56
9.3.2 Rationale and supplemental guidance. 56
9.3.3 Requirement enhancements . 56
9.3.4 Security levels . 57
9.4 SR 5.2 – Zone boundary protection . 57
9.4.1 Requirement . 57
9.4.2 Rationale and supplemental guidance. 57
9.4.3 Requirement enhancements . 57
9.4.4 Security levels . 58
9.5 SR 5.3 – General purpose person-to-person communication restrictions . 58
9.5.1 Requirement . 58
9.5.2 Rationale and supplemental guidance. 58
9.5.3 Requirement enhancements . 58
9.5.4 Security levels . 59
9.6 SR 5.4 – Application partitioning . 59
9.6.1 Requirement . 59
9.6.2 Rationale and supplemental guidance. 59
9.6.3 Requirement enhancements . 59
9.6.4 Security levels . 59
10 FR 6 – Timely response to events. 59
10.1 Purpose and SL-C(TRE) descriptions . 59
10.2 Rationale . 60
10.3 SR 6.1 – Audit log accessibility . 60
10.3.1 Requirement . 60

10.3.2 Rationale and supplemental guidance. 60
10.3.3 Requirement enhancements . 60
10.3.4 Security levels . 60
10.4 SR 6.2 – Continuous monitoring . 60
10.4.1 Requirement . 60
10.4.2 Rationale and supplemental guidance. 60
10.4.3 Requirement enhancements . 61
10.4.4 Security levels . 61
11 FR 7 – Resource availability . 61
11.1 Purpose and SL-C(RA) descriptions . 61
11.2 Rationale . 61
11.3 SR 7.1 – Denial of service protection . 62
11.3.1 Requirement . 62
11.3.2 Rationale and supplemental guidance. 62
11.3.3 Requirement enhancements . 62
11.3.4 Security levels . 62
11.4 SR 7.2 – Resource management . 62
11.4.1 Requirement . 62
11.4.2 Rationale and supplemental guidance. 62
11.4.3 Requirement enhancements . 62
11.4.4 Security levels . 63
SR 7.3 – Control system backup . 63
11.5
11.5.1 Requirement . 63
11.5.2 Rationale and supplemental guidance. 63
11.5.3 Requirement enhancements . 63
11.5.4 Security levels . 63
11.6 SR 7.4 – Control system recovery and reconstitution . 63
11.6.1 Requirement . 63
11.6.2 Rationale and supplemental guidance. 63
11.6.3 Requirement enhancements . 64
11.6.4 Security levels . 64
11.7 SR 7.5 – Emergency power . 64
11.7.1 Requirement . 64
11.7.2 Rationale and supplemental guidance. 64
11.7.3 Requirement enhancements . 64
11.7.4 Security levels . 64
11.8 SR 7.6 – Network and security configuration settings . 64
11.8.1 Requirement . 64
11.8.2 Rationale and supplemental guidance. 64
11.8.3 Requirement enhancements . 65
11.8.4 Security levels . 65
11.9 SR 7.7 – Least functionality . 65
11.9.1 Requirement . 65
11.9.2 Rationale and supplemental guidance. 65
11.9.3 Requirement enhancements . 65
11.9.4 Security levels . 65
11.10 SR 7.8 – Control system component inventory . 66
11.10.1 Requirement . 66
11.10.2 Rationale and supplemental guidance. 66

– 8 – IEC 62443-3-3:2013 © IEC 2013
11.10.3 Requirement enhancements . 66
11.10.4 Security levels . 66
Annex A (informative) Discussion of the SL vector . 67
Annex B (informative) Mapping of SRs and REs to FR SL levels 1-4 . 75
Bibliography . 79

Figure 1 – Structure of the IEC 62443 series . 13
Figure A.1 – High-level process-industry example showing zones and conduits . 69
Figure A.2 – High-level manufacturing example showing zones and conduits . 70
Figure A.3 – Schematic of correlation of the use of different SL types . 71

Table B.1 – Mapping of SRs and REs to FR SL levels 1-4 (1 of 4) . 75

INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
INDUSTRIAL COMMUNICATION NETWORKS –
NETWORK AND SYSTEM SECURITY –
Part 3-3: System security requirements and security levels

FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8)
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

The article is about a standard, IEC 62443-3-3:2013, that provides technical control system requirements and security levels for industrial communication networks. This standard is used by the industrial automation and control system community to develop appropriate control system target security levels for specific assets. The article also mentions that the corrigendum from April 2014 is included in the copy of the standard.

記事タイトル:IEC 62443-3-3:2013-産業通信ネットワーク-ネットワークとシステムセキュリティ-パート3-3:システムセキュリティ要件とセキュリティレベル 記事内容:IEC 62443-3-3:2013は、IEC 62443-1-1で説明されている基本要件(FRs)と関連する技術的な制御システム要件(SRs)を提供しています。これには、制御システムの能力セキュリティレベルであるSL-C(制御システム)の要件の定義も含まれます。これらの要件は、特定の資産の適切な制御システムの目標セキュリティレベルであるSL-T(制御システム)を開発する際に、産業オートメーションおよび制御システム(IACS)コミュニティのさまざまなメンバーによって使用されます。2014年4月の訂正内容もこの複写に含まれています。

기사 제목: IEC 62443-3-3:2013 - 산업 통신 네트워크 - 네트워크 및 시스템 보안 - 파트 3-3: 시스템 보안 요구 사항 및 보안 수준 기사 내용: IEC 62443-3-3:2013은 IEC 62443-1-1에서 설명된 7가지 기본 요구 사항 (FRs)와 관련된 자세한 기술적 제어 시스템 요구 사항 (SRs)을 제공합니다. 이것은 통제 시스템 능력 보안 수준, SL-C(통제 시스템)에 대한 요구 사항을 정의하는 것을 포함합니다. 이러한 요구 사항은 지정된 구역과 시스템에 대한 도관과 함께 산업 자동화 및 제어 시스템 (IACS) 커뮤니티의 다양한 구성원에 의해 사용됩니다. 이 요구 사항은 특정 자산에 대한 적절한 통제 시스템 목표 보안 수준, SL-T(통제 시스템)을 개발하는 데 사용됩니다. 2014년 4월 개정내용이 이 복사본에 포함되어 있습니다.

IEC 62443-3-3:2013은 산업 통신 네트워크 및 시스템 보안에 관한 기술적인 요구 사항을 제공하는 표준이다. 이 표준은 IEC 62443-1-1에서 설명된 일곱 가지 기본 요구 사항과 관련된 세부적인 제어 시스템 요구 사항 (SRs)을 제시한다. 특정 자산을 위한 적합한 제어 시스템 목표 SL (SL-T)을 개발하는 동안 IACS(산업 자동화 및 제어 시스템) 커뮤니티의 다양한 구성원들이 이 요구 사항을 사용한다. 표준은 또한 고려 중인 시스템 (SuC)의 구역과 도관도를 고려한다. 본 글에는 2014년 4월 수정안의 내용도 포함되어 있다.

IEC 62443-3-3:2013 is a standard that provides technical requirements for control systems, specifically related to security. It is based on seven foundational requirements outlined in IEC 62443-1-1. The standard defines the security levels (SL-C) for control system capability and is used by members of the industrial automation and control system (IACS) community. It also considers the specific system under consideration (SuC) and its zones and conduits. The article mentions that the content from the April 2014 corrigendum has been included in this version of the standard.

記事タイトル:IEC 62443-3-3:2013 - 産業通信ネットワーク - ネットワークおよびシステムセキュリティ - 第3-3部:システムセキュリティ要件およびセキュリティレベル 記事内容:IEC 62443-3-3:2013は、IEC 62443-1-1で説明されている7つの基本要件(FRs)に関連する詳細な技術的制御システム要件(SRs)を提供します。この標準は、制御システム能力セキュリティレベル(SL-C)の要件を定義し、産業オートメーションおよび制御システム(IACS)コミュニティのさまざまなメンバーが使用することができます。また、対象システム(SuC)およびそのゾーンと導管を考慮しながら、特定の資産に対する適切な制御システム目標SL(SL-T)を開発します。2014年4月の修正内容もこのコピーに含まれています。