SIST EN IEC 62443-2-4:2024
(Main)Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers (IEC 62443-2-4:2023)
Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers (IEC 62443-2-4:2023)
IEC 62443-2:2023 specifies a comprehensive set of requirements for security-related processes that IACS service providers can offer to the asset owner during integration and maintenance activities of an Automation Solution. Because not all requirements apply to all industry groups and organizations, Subclause 4.1.4 provides for the development of "profiles" that allow for the subsetting of these requirements. Profiles are used to adapt this document to specific environments, including environments not based on an IACS.
NOTE 1 The term "Automation Solution" is used as a proper noun (and therefore capitalized) in this document to prevent confusion with other uses of this term. Collectively, the security processes offered by an IACS service provider are referred to as its Security Program (SP) for IACS asset owners. In a related specification, IEC 62443-2-1 describes requirements for the Security Management System of the asset owner.
NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related. Figure 1 illustrates the integration and maintenance security processes of the asset owner, service provider(s), and product supplier(s) of an IACS and their relationships to each other and to the Automation Solution. Some of the requirements of this document relating to the safety program are associated with security requirements described in IEC 62443-3-3 and IEC 62443-4-2.
NOTE 3 The IACS is a combination of the Automation Solution and the organizational measures necessary for its design, deployment, operation, and maintenance.
NOTE 4 Maintenance of legacy system with insufficient security technical capabilities, implementation of policies, processes and procedures can be addressed through risk mitigation.
IT-Sicherheit für industrielle Automatisierungssysteme - Teil 2-4: Anforderungen an das IT-Sicherheitsprogramm von Dienstleistern für industrielle Automatisierungssysteme (IEC 62443-2-4:2023)
Sécurité des automatismes industriels et des systèmes de commande - Partie 2-4: Exigences de programme de sécurité pour les fournisseurs de service IACS (IEC 62443-2-4:2023)
L’IEC 62453-2:2023 fournit des informations sur l’intégration de la technologie CIP™ dans la spécification des interfaces des outils des dispositifs de terrain (FDT) (IEC 62453-2). La Famille de profils de communication 2 (communément appelée CIP™ définit des profils de communication basés sur les normes IEC 61158‑2 Type 2, IEC 61158‑3‑2, IEC 61158‑4‑2, IEC 61158‑5‑2, IEC 61158‑6‑2 et IEC 62026‑3. Les profils de base CP 2/1 (ControlNet™), CP 2/2 (EtherNet/IP™) et CP 2/3 (DeviceNet™1) sont définis dans l’IEC 61784-1 et l’IEC 61784-2. Un Profil de communication supplémentaire (CompoNet™1), également basé sur CIP™, est défini dans l’IEC 62026-7. La présente partie de l’IEC 62453 spécifie les services de communication et autres services. La présente spécification ne contient pas la spécification des outils FDT et ne la modifie pas.CIP™ (Common Industrial Protocol), DeviceNet™ et CompoNet™ sont les appellations commerciales de Open DeviceNet Vendor Association, Inc (ODVA). Cette information est donnée à l’intention des utilisateurs du présent document et ne signifie nullement que l’IEC approuve ou recommande le détenteur de la marque ou de l’un quelconque de ses produits. La conformité à la présente norme n’exige pas l’emploi des appellations commerciales CIP™, DeviceNet™ ou CompoNet™. L’utilisation des appellations commerciales CIP™, DeviceNet™ ou CompoNet™ nécessite l’autorisation de Open DeviceNet Vendor Association, Inc. ControlNet™ est l’appellation commerciale de ControlNet International, Ltd. Cette information est donnée à l’intention des utilisateurs du présent document et ne signifie nullement que l’IEC approuve ou recommande le détenteur de la marque ou de l’un quelconque de ses produits. La conformité à ce profil n’exige pas l’emploi de l’appellation commerciale ControlNet™. L’utilisation de l’appellation commerciale ControlNet™ nécessite l’autorisation de ControlNet International, Ltd. EtherNet/IP™ est l’appellation commerciale de ControlNet International, Ltd et de Open DeviceNet Vendor Association, Inc. Cette information est donnée à l’intention des utilisateurs du présent document et ne signifie nullement que l’IEC approuve ou recommande le détenteur de la marque ou de l’un quelconque de ses produits. La conformité à ce profil n’exige pas l’emploi de l’appellation commerciale EtherNet/IP™. L’utilisation de l’appellation commerciale EtherNet/IP™ nécessite l’autorisation de ControlNet International, Ltd. ou de Open DeviceNet Vendor Association, Inc.
Zaščita industrijske avtomatizacije in nadzornih sistemov - 2-4. del: Zahteve za program zaščite za ponudnike storitev IACS (IEC 62443-2-4:2023)
Standard IEC 62443-2:2023 določa izčrpen sklop zahtev za procese v zvezi z zaščito, ki jih lahko ponudniki storitev IACS zagotavljajo lastniku sredstva med integracijo in vzdrževanjem rešitve avtomatizacije. Ker vse zahteve ne veljajo za vse industrijske skupine in organizacije, podtočka 4.1.4 zagotavlja razvoj »profilov«, ki omogočajo podnabor teh zahtev. Profili se uporabljajo za prilagoditev tega dokumenta posebnim okoljem, vključno z okolji, ki ne temeljijo na storitvah IACS.
OPOMBA 1: Izraz »rešitev avtomatizacije« se v tem dokumentu uporablja kot lastno ime (in je zato zapisan z veliko začetnico), da ga ni mogoče zamenjati z drugimi uporabami tega izraza. Skupaj se procesi zaščite, ki jih zagotavlja ponudnik storitev IACS, imenujejo njegov program zaščite (SP) za lastnike sredstev IACS. V povezani specifikaciji standard IEC 62443-2-1 opisuje zahteve za sistem upravljanja zaščite lastnika sredstva.
OPOMBA 2: Na splošno so te zmogljivosti zaščite povezane s politiko, postopki, prakso in osebjem. Slika 1 prikazuje procese zaščite, ki jih v okviru integracije in vzdrževanja izvajajo lastnik sredstva, ponudnik(-i) storitve in dobavitelj(-i) storitve IACS, ter njihova razmerja med seboj in do rešitve avtomatizacije. Nekatere zahteve v tem dokumentu, ki se navezujejo na program zaščite, so povezane z zahtevami glede zaščite iz standardov IEC 62443-3-3 in IEC 62443-4-2.
OPOMBA 3: IACS je kombinacija rešitve avtomatizacije in organizacijskih ukrepov, potrebnih za njeno načrtovanje, uvedbo, delovanje in vzdrževanje.
OPOMBA 4: K vzdrževanju starejšega sistema z nezadostno tehnično zmogljivostjo na področju zaščite ter izvajanju pravilnikov, procesov in postopkov je mogoče pristopiti z zmanjšanjem tveganja.
General Information
Relations
Standards Content (Sample)
SLOVENSKI STANDARD
01-september-2024
Zaščita industrijske avtomatizacije in nadzornih sistemov - 2-4. del: Zahteve za
program zaščite za ponudnike storitev IACS (IEC 62443-2-4:2023)
Security for industrial automation and control systems - Part 2-4: Security program
requirements for IACS service providers (IEC 62443-2-4:2023)
IT-Sicherheit für industrielle Automatisierungssysteme - Teil 2-4: Anforderungen an das
IT-Sicherheitsprogramm von Dienstleistern für industrielle Automatisierungssysteme
(IEC 62443-2-4:2023)
Sécurité des automatismes industriels et des systèmes de commande - Partie 2-4:
Exigences de programme de sécurité pour les fournisseurs de service IACS (IEC 62443-
2-4:2023)
Ta slovenski standard je istoveten z: EN IEC 62443-2-4:2024
ICS:
25.040.01 Sistemi za avtomatizacijo v Industrial automation
industriji na splošno systems in general
35.030 Informacijska varnost IT Security
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
EUROPEAN STANDARD EN IEC 62443-2-4
NORME EUROPÉENNE
EUROPÄISCHE NORM January 2024
ICS 25.040.40; 35.100.05 Supersedes EN IEC 62443-2-4:2019;
EN IEC 62443-2-4:2019/A1:2019
English Version
Security for industrial automation and control systems - Part 2-4:
Security program requirements for IACS service providers
(IEC 62443-2-4:2023)
Sécurité des automatismes industriels et des systèmes de IT-Sicherheit für industrielle Automatisierungssysteme - Teil
commande - Partie 2-4: Exigences de programme de 2-4: Anforderungen an das IT-Sicherheitsprogramm von
sécurité pour les fournisseurs de service IACS Dienstleistern für industrielle Automatisierungssysteme
(IEC 62443-2-4:2023) (IEC 62443-2-4:2023)
This European Standard was approved by CENELEC on 2024-01-19. CENELEC members are bound to comply with the CEN/CENELEC
Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration.
Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC
Management Centre or to any CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by translation
under the responsibility of a CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the
same status as the official versions.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,
Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the
Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland,
Türkiye and the United Kingdom.
European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2024 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.
Ref. No. EN IEC 62443-2-4:2024 E
European foreword
The text of document 65/1021/FDIS, future edition 2 of IEC 62443-2-4, prepared by IEC/TC 65
"Industrial-process measurement, control and automation" was submitted to the IEC-CENELEC
parallel vote and approved by CENELEC as EN IEC 62443-2-4:2024.
The following dates are fixed:
• latest date by which the document has to be implemented at national (dop) 2024-10-19
level by publication of an identical national standard or by endorsement
• latest date by which the national standards conflicting with the (dow) 2027-01-19
document have to be withdrawn
This document supersedes EN IEC 62443-2-4:2019 and all of its amendments and corrigenda (if any).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CENELEC shall not be held responsible for identifying any or all such patent rights.
Any feedback and questions on this document should be directed to the users’ national committee. A
complete listing of these bodies can be found on the CENELEC website.
Endorsement notice
The text of the International Standard IEC 62443-2-4:2023 was approved by CENELEC as a
European Standard without any modification.
In the official version, for Bibliography, the following notes have to be added for the standard indicated:
IEC 62682:2022 NOTE Approved as EN IEC 62682:2023 (not modified)
ISO/IEC 30111 NOTE Approved as EN ISO/IEC 30111
ISO 15189:2022 NOTE Approved as EN ISO 15189:2022 (not modified)
IEC 62443-2-4 ®
Edition 2.0 2023-12
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Security for industrial automation and control systems –
Part 2-4: Security program requirements for IACS service providers
Sécurité des automatismes industriels et des systèmes de commande –
Partie 2-4: Exigences de programme de sécurité pour les fournisseurs de
service IACS
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
INTERNATIONALE
ICS 25.040.40, 35.100.05 ISBN 978-2-8322-7779-9
– 2 – IEC 62443-2-4:2023 © IEC 2023
CONTENTS
FOREWORD . 3
1 Scope . 5
2 Normative references . 6
3 Terms, definitions and abbreviated terms . 7
3.1 Terms and definitions . 7
3.2 Abbreviated terms . 11
4 Concepts . 13
4.1 Use of this document . 13
4.1.1 Use of this document by service providers . 13
4.1.2 Use of this document by asset owners . 14
4.1.3 Use of this document during negotiations between asset owners and
IACS service providers . 15
4.1.4 Profiles . 15
4.1.5 Integration service providers . 15
4.1.6 Maintenance service providers . 16
4.2 Maturity model . 17
5 Requirements overview . 18
5.1 Contents . 18
5.2 Sorting and filtering . 19
5.3 IEC 62264-1 hierarchy model . 19
5.4 Requirements table columns . 19
5.5 Column definitions . 19
5.5.1 Req ID column . 19
5.5.2 BR/RE column . 20
5.5.3 Functional area column . 20
5.5.4 Topic column . 21
5.5.5 Subtopic column . 22
5.5.6 Documentation column . 24
5.5.7 Requirement description column . 24
5.5.8 Rationale column . 25
Annex A (normative) Security requirements . 26
Bibliography . 91
Figure 1 – Scope of service provider processes . 6
Table 1 – Maturity levels . 18
Table 2 – Columns . 19
Table 3 – Functional area column values . 21
Table 4 – Architecture Functional Area Summary Levels . 21
Table 5 – Topic column values . 22
Table 6 – Subtopic column values . 23
Table A.1 – Security program requirements . 26
IEC 62443-2-4:2023 © IEC 2023 – 3 –
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –
Part 2-4: Security program requirements
for IACS service providers
FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote international
co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and
in addition to other activities, IEC publishes International Standards, Technical Specifications, Technical Reports,
Publicly Available Specifications (PAS) and Guides (hereafter referred to as "IEC Publication(s)"). Their
preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with
may participate in this preparatory work. International, governmental and non-governmental organizations liaising
with the IEC also participate in this preparation. IEC collaborates closely with the International Organization for
Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence between
any IEC Publication and the corresponding national or regional publication shall be clearly indicated in the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) IEC draws attention to the possibility that the implementation of this document may involve the use of (a)
patent(s). IEC takes no position concerning the evidence, validity or applicability of any claimed patent rights in
respect thereof. As of the date of publication of this document, IEC had not received notice of (a) patent(s), which
may be required to implement this document. However, implementers are cautioned that this may not represent
the latest information, which may be obtained from the patent database available at https://patents.iec.ch. IEC
shall not be held responsible for identifying any or all such patent rights.
This document has been prepared by of IEC technical committee 65: Industrial-process
measurement, control and automation in collaboration with the liaison International
Instrumentation Users Association, referred to as the WIB from its original and now obsolete
Dutch name. It is an International Standard.
This publication contains an attached file in the form of a .CSV spreadsheet version of
Table A.1. This file is intended to be used as a complement and does not form an integral part
of the publication.
This second edition cancels and replaces the first edition published in 2015 and
Amendment 1:2017. This edition constitutes a technical revision.
– 4 – IEC 62443-2-4:2023 © IEC 2023
This edition contains editorial updates and clarifications and does not contain significant
technical changes with respect to the previous edition. One area of clarification is that some of
the requirements could have been interpreted as requirements for technical capabilities. These
requirements were clarified so that they are expressed as requirements for the
use/configuration of technical capabilities.
The text of this International Standard is based on the following documents:
Draft Report on voting
65/1021/FDIS 65/1029/RVD
Full information on the voting for its approval can be found in the report on voting indicated in
the above table.
The language used for the development of this International Standard is English.
This document was drafted in accordance with ISO/IEC Directives, Part 2, and developed in
accordance with ISO/IEC Directives, Part 1 and ISO/IEC Directives, IEC Supplement, available
at www.iec.ch/members_experts/refdocs. The main document types developed by IEC are
described in greater detail at www.iec.ch/publications.
A list of all parts in the IEC 62443 series, published under the general title Security for industrial
automation and control systems, can be found on the IEC website.
Future standards in this series will carry the new general title as cited above. Titles of existing
standards in this series will be updated at the time of the next edition.
The committee has decided that the contents of this document will remain unchanged until the
stability date indicated on the IEC website under webstore.iec.ch in the data related to the
specific document. At this date, the document will be
• reconfirmed,
• withdrawn, or
• revised.
IMPORTANT – The "colour inside" logo on the cover page of this document indicates
that it contains colours which are considered to be useful for the correct understanding
of its contents. Users should therefore print this document using a colour printer.
IEC 62443-2-4:2023 © IEC 2023 – 5 –
SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –
Part 2-4: Security program requirements
for IACS service providers
1 Scope
This part of IEC 62443 specifies a comprehensive set of requirements for security-related
processes that IACS service providers can offer to the asset owner during integration and
maintenance activities of an Automation Solution. Because not all requirements apply to all
industry groups and organizations, Subclause 4.1.4 provides for the development of "profiles"
that allow for the subsetting of these requirements. Profiles are used to adapt this document to
specific environments, including environments not based on an IACS.
NOTE 1 The term "Automation Solution" is used as a proper noun (and therefore capitalized) in this document to
prevent confusion with other uses of this term.
Collectively, the security processes offered by an IACS service provider are referred to as its
Security Program (SP) for IACS asset owners. In a related specification, IEC 62443-2-1
describes requirements for the Security Management System of the asset owner.
NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related.
Figure 1 illustrates the integration and maintenance security processes of the asset owner,
service provider(s), and product supplier(s) of an IACS and their relationships to each other
and to the Automation Solution. Some of the requirements of this document relating to the safety
program are associated with security requirements described in IEC 62443-3-3 and
IEC 62443-4-2.
NOTE 3 The IACS is a combination of the Automation Solution and the organizational measures necessary for its
design, deployment, operation, and maintenance.
NOTE 4 Maintenance of legacy system with insufficient security technical capabilities, implementation of policies,
processes and procedures can be addressed through risk mitigation.
– 6 – IEC 62443-2-4:2023 © IEC 2023
Figure 1 – Scope of service provider processes
In Figure 1, the Automation Solution is illustrated to contain essential functions that include
safety functions, commonly implemented by a Safety Instrumented System (SIS), and
complementary and control functions, commonly implemented by supporting applications, such
as batch management, advanced control, historian, and security related applications. The
dashed boxes identify organizational roles that perform the indicated actions.
NOTE 5 Automation Solutions typically have a single control system (product), but they are not restricted to do so.
In general, the Automation Solution is the set of hardware and software, independent of product packaging, which is
used to control a physical process (e.g. continuous or manufacturing) as defined by the asset owner.
NOTE 6 Service providers often provide generic architectures that can be adapted for integration into an Automation
Solution. These generic architectures are often referred to as "reference architectures".
2 Normative references
There are no normative references in this document.
IEC 62443-2-4:2023 © IEC 2023 – 7 –
3 Terms, definitions and abbreviated terms
3.1 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminology databases for use in standardization at the following
addresses:
• IEC Electropedia: available at https://www.electropedia.org/
• ISO Online browsing platform: available at https://www.iso.org/obp/
3.1.1
asset owner
role of an organization responsible for one or more IACSs
Note 1 to entry: The term "asset owner" is used in place of the generic term "end user" to provide differentiation.
Note 2 to entry: This definition includes the components that are part of the IACS.
Note 3 to entry: In the context of this document, asset owner also includes the operator of the IACS.
[SOURCE: IEC 62443-3-3:2013, 3.1.2, modified to be role-based.]
3.1.2
attack surface
physical and functional interfaces of a system that can be accessed and through which the
system can be potentially exploited
Note 1 to entry: The size of the attack surface for a software interface is proportional to the number of methods and
parameters defined for the interface. Simple interfaces, therefore, have smaller attack surfaces than complex
interfaces.
Note 2 to entry: The size of the attack surface and the number of vulnerabilities are not necessarily related to each
other.
3.1.3
Automation Solution
collection of control system and any complementary components that have been installed and
configured to operate in an IACS
Note 1 to entry: Automation Solution is used as a proper noun in this document.
Note 2 to entry: The difference between the control system and the Automation Solution is that the control system
is incorporated into the Automation Solution design (e.g. a specific number of workstations, controllers, and devices
in a specific configuration), which is then implemented. The resulting configuration is referred to as the
Automation Solution.
Note 3 to entry: The Automation Solution can be provided by multiple suppliers, including the product supplier of
the control system and the product suppliers of complementary components.
Note 4 to entry: The Automation Solution does not include the processes and procedures used during integration,
maintenance, and operation of the IACS.
Note 5 to entry: An Automation Solution, once integration into a given environment is complete, is ready for
operation.
– 8 – IEC 62443-2-4:2023 © IEC 2023
3.1.4
basic process control system
BPCS
system that responds to input signals from the process, its associated equipment, other
programmable systems and/or an operator and generates output signals causing the process
and its associated equipment to operate in the desired manner but does not perform any safety
instrumented functions (SIF)
Note 1 to entry: Safety instrumented functions are specified in the IEC 61508 series.
Note 2 to entry: The term "process" in this definition can apply to a variety of industrial processes, including
continuous processes and manufacturing processes.
3.1.5
component
entity belonging to an IACS that exhibits the characteristics of one or more of a host device,
network device, software application, or embedded device
3.1.6
consultant
subcontractor that provides guidance, including expert advice, to the asset owner, integration
or maintenance service provider, or product supplier
Note 1 to entry: A consultant can provide assistance for component or system countermeasures.
[SOURCE: ISO 15189:2022, 3.7, modified – subcontractor and roles added.]
3.1.7
control system
hardware and software components used in the design and implementation of an IACS
Note 1 to entry: As shown in Figure 1, control systems are composed of field devices, embedded control devices,
network devices, and host devices (including workstations and servers).
Note 2 to entry: As shown in Figure 1, control systems are represented in the Automation Solution by a BPCS and
an optional SIS.
[SOURCE: IEC 62443-3-3:2013, 3.1.16, modified to specify how it is used.]
3.1.8
essential function
function or capability that is required to maintain health, safety, the environment and availability
for the equipment under control
Note 1 to entry: Essential functions include, but are not limited to, the safety instrumented function (SIF), the control
function and the ability of the operator to view and manipulate the equipment under control. The loss of essential
functions is commonly termed loss of protection, loss of control and loss of view respectively. In some industries
additional functions such as history can be considered essential.
[SOURCE: IEC 62443-3-3:2013, 3.1.22]
3.1.9
handover
act of turning an Automation Solution over to the asset owner
Note 1 to entry: Handover effectively transfers responsibility for operations and maintenance of an
Automation Solution from the integration service provider to the asset owner and generally occurs after successful
completion of system test, often referred to as Site Acceptance Test (SAT).
IEC 62443-2-4:2023 © IEC 2023 – 9 –
3.1.10
harden
process of improving the security of a system or component through a reduction of risk factors
Note 1 to entry: Hardening generally involves adapting and configuring the Automation Solution/components and
related policies and procedures to meet the security needs of the asset owner’s site.
3.1.11
industrial automation and control system
IACS
collection of personnel, hardware, software, procedures and policies involved in the operation
of the industrial process and that can affect or influence its safe, secure and reliable operation
Note 1 to entry: The IACS can include components that are not installed at the asset owner’s site.
Note 2 to entry: The definition of IACS is illustrated in Figure 1. Examples of IACSs include Distributed Control
Systems (DCS) and Supervisory Control and Data Acquisition (SCADA) systems. This document also defines the
proper noun "Automation Solution" to mean the specific instance of the control system product and possibly additional
components that are designed into the IACS. The Automation Solution, therefore, differs from the control system
since it represents a specific implementation (design and configuration) of the control system hardware and software
components for a specific asset owner.
[SOURCE: IEC 62443-3-3:2013, 3.1.29, modified – Notes to entry added.]
3.1.12
integration service provider
service provider that provides integration activities for an Automation Solution including design,
installation, configuration, testing, commissioning, and handover
Note 1 to entry: Integration service providers are often referred to as integrators or Main Automation Contractors
(MAC).
3.1.13
maintenance service provider
service provider that provides support activities for an Automation Solution after handover
Note 1 to entry: Maintenance is often considered to be distinguished from operation (e.g. in common colloquial
language, it is often assumed that an Automation Solution is either in operation or under maintenance). Maintenance
service providers can perform support activities during operations, for example managing user accounts, security
monitoring, and security assessments.
3.1.14
portable media
portable devices that contain data storage capabilities that can be used to physically copy data
from one piece of equipment and transfer it to another
Note 1 to entry: Types of portable media include but are not limited to: CD/DVD/Blu-ray media, USB memory
devices, smart phones, flash memory, solid state disks, hard drives, handhelds, and portable computers.
3.1.15
product
system, subsystem or component that is manufactured, developed or refined and that may be
used in other products or integrated into an Automation Solution
Note 1 to entry: The processes required by the practices defined in this document apply iteratively to all levels of
product design (for example, from the system level to the component level).
3.1.16
product supplier
manufacturer of hardware and/or software product
Note 1 to entry: Used in place of the generic word "vendor" to provide differentiation.
– 10 – IEC 62443-2-4:2023 © IEC 2023
3.1.17
profile
named combination of options, chosen according to a specified framework, necessary to
accomplish a particular function
Note 1 to entry: The options can be chosen from one or several documents or subdivisions of documents.
3.1.18
remote access
access to a control system through an external interface of the control system
Note 1 to entry: Examples of applications that support remote access include RDP, OPC, and Syslog.
Note 2 to entry: In general, remote access applications and the Automation Solution will reside in different security
zones as determined by the asset owner. See IEC 62443-3-2 for the application of zones and conduits to the
Automation Solution by the asset owner.
[SOURCE: IEC 62443-3-3:2013, 3.1.35, modified to specify access is through an external
interface, and notes to entries added.]
3.1.19
safety instrumented system
system used to implement functional safety
Note 1 to entry: See the IEC 61508 series and the IEC 61511 series for more information on functional safety.
Note 2 to entry: Not all industry sectors use "safety instrumented system". This term is not restricted to any specific
industry sector, and it is used generically to refer to systems that enforce functional safety. Other equivalent terms
include "safety systems" and "safety related systems".
[SOURCE: IEC 62443-3-3:2013, 3.1.37, modified to be more general (implement functional
safety), and notes to entries added.]
3.1.20
security compromise
violation of the security of a system such that an unauthorized (1) disclosure or modification of
information or (2) denial of service could possibly have occurred
Note 1 to entry: A security compromise represents a breach of the security of a system or an infraction of its security
policies. It is independent of impact or potential impact to the system.
3.1.21
security incident
security compromise that is of some significance to the asset owner or failed attempt to
compromise the system whose result could have been of some significance to the asset owner
Note 1 to entry: The expression "of some significance" is relative to the environment in which the security
compromise is detected. For example, the same compromise can be declared as a security incident in one
environment and not in another. Triage activities are often used by asset owners to evaluate security compromises
and identify those that are significant enough to be considered incidents.
Note 2 to entry: In some environments, failed attempts to compromise the system, such as failed login attempts,
are considered significant enough to be classified as security incidents.
3.1.22
security patch
software update that is relevant to the security of a software component
Note 1 to entry: For the purpose of this definition, firmware is considered software.
Note 2 to entry: Software patches can address known or potential vulnerabilities, or simply improve the security of
the software component, including its reliable operation.
IEC 62443-2-4:2023 © IEC 2023 – 11 –
3.1.23
security program
portfolio of security services, including integration services and maintenance services, and their
associated policies, procedures, and products that are applicable to the IACS
Note 1 to entry: The security program for IACS service providers refers to the policies and procedures defined by
them to address security concerns of the IACS.
3.1.24
service provider
role of an organization (internal or external organization, manufacturer, etc.) that provides a
specific support service and associated supplies in accordance with an agreement with the
asset owner
Note 1 to entry: This term is used in place of the generic word "vendor" to provide differentiation.
[SOURCE: IEC 62443-3-3:2013, 3.1.39, modified to be role-based.]
3.1.25
subcontractor
service provider under contract to the integration or maintenance service provider or to another
subcontractor that is directly or indirectly under contract to the integration or maintenance
service provider
3.1.26
system
interacting, interrelated, or interdependent elements forming a complex whole
Note 1 to entry: A system can possibly be packaged as a product.
Note 2 to entry: In practice, the interpretation of the meaning of "system" is frequently clarified by the use of an
adjective, such as control system. In the context of a control system, the elements are largely hardware and software
elements.
[SOURCE: IEC TS 62443-1-1:2009, 3.2.123, modified – Notes to entry added.]
3.1.27
verify
check that the specified requirement was met
3.1.28
vulnerability
flaw or weakness in the design, implementation, or operation and management of a component
that can be exploited to cause a security compromise
Note 1 to entry: Security policies typically include policies to protect confidentiality, integrity, and availability of
system assets.
[SOURCE: IEC TS 62443-1-1:2009, 3.2.135, modified – generalized to cause a security
compromise.]
3.2 Abbreviated terms
ABAC Attribute-Based Access Control
AES_GCM Advanced Encryption Standard Galois/Counter Mode
ANSI American National Standards Institute
BPCS Basic Process Control System
BR Base Requirement
CA Certificate Authority
– 12 – IEC 62443-2-4:2023 © IEC 2023
CD Compact Disk
CEF Common Event Format
CMMI Capability Maturity Model Integration
DCS Distributed Control System
DES Data Encryption Standard
DVD Digital Video Disk, Digital Versatile Disk
EICAR European Institute of Computer Anti-virus Research
EWS Engineering Workstation
FAT Factory Acceptance Test
IACS Industrial Automation and Control System
ID Identifier
IDS Intrusion Detection System
IP Internet Protocol
IPS Intrusion Prevent System
ISA International Society of Automation
LDAP Lightweight Directory Access Protocol
MAC Main Automation Contractor
MIB Management Information Base
MoC Management of Change
NAMUR User Association of Automation Technology in Process Industries
NDA Non-Disclosure Agreement
NIDS Network Intrusion and Detection System
OPC Open Platform Communications
PAS Publicly Available Specification
PBAC Policy-Based Access Control
PtW Permit to Work
RBAC Role-Based Access Control
RE Requirement Enhancement
RDP Remote Desktop Protocol
RFC Request For Comment
RFQ Request For Quote
SAT Site Acceptance Test
SCADA Supervisory Control And Data Acquisition
SIEM Security Information and Event Management
SIF Safety Instrumented Function
SIL Safety Integrity Level
SIS Safety Instrumented System
SNMP Simple Network Management Protocol
SOW Statement Of Work
SSID Service Set Identifier
SP Security Program
TCP Transmission Control Protocol
TR Technical Report
IEC 62443-2-4:2023 © IEC 2023 – 13 –
UDP User Datagram Protocol
USB Universal Serial Bus
VPN Virtual Private Network
WEP Wired Equivalent Privacy
4 Concepts
4.1 Use of this document
4.1.1 Use of this document by service providers
"Service provider" and "asset owner" are terms that represent roles of an organization. While
they can be in the same organization, they are typically in separate organizations, with the
service provider's organization under contract/agreement to the asset owner’s organization.
This document defines a single set of requirements for security-related processes to be
supported by security programs of both integration and maintenance service providers (see
4.1.5 and 4.1.6). Although implementation of these requirements by integration and
maintenance service providers can be different, the requirements apply equally to both. Support
for these requirements means that the service provider can provide them to the asset owner
upon request.
The terms and conditions for providing these processes are beyond the scope of this document.
In addition, this document can be used by these service providers to structure and improve their
security programs.
In addition, service providers can use IEC 62443-3-3 and IEC 62443-4-2 in conjunction with
this document to work with suppliers of underlying control systems/components. This
collaboration can assist the service provider in developing policies and procedures around the
capability of a system/component, for example backup and restore based on the
recommendations from the suppliers of the systems/components used.
NOTE IACS is a generic expression used to describe an industrial automation and control system (based on the
definition taken from IEC TS 62443-1-1), that can be extended to other automation vertical industries. For example:
Substation Automation Solutions, smart grid, distributed grid, medical device manufacturing, building automation
systems, elevators, and escalators.
The security programs implementing these requirements are expected to be independent of
different releases of the control system that is embedded in the Automation Solution. Therefore,
a new release of the control system product does not necessarily require a change to the service
provider’s security program. However, changes to the security program will be required when
changes to the underlying control system make the existing security program deficient with
respect to these IEC 62443-2-4 requirements.
EXAMPLE 1 A service provider can have experience with a specific control system line of products. Developing
policies and procedures for that line of products will be based on the recommendations of the product supplier and
the capabilities of the product line. Therefore, when the product capabilities for backup and restore are changed, it
is possible the corresponding processes of the service provider's security program (corresponding to SP.12.XX) will
need to be changed to remain consistent with the updated product capabilities. On the other hand, the service
provider's policies and procedures around non-disclosure agreements or personnel background checks
(corresponding to SP.01.03 and SP.01.04) are very likely independent of the control system product used in the
Automation Solution.
This collaboration can also be used to improve security in these systems/components. First,
the service provider can recommend new or updated security features to the system/component
supplier. Second, the service provider can gain knowledge about the system/component that
allows it to add its own compensating security measures to the Automation Solution during
deployment or maintenance.
– 14 – IEC 62443-2-4:2023 © IEC 2023
The security requirements are specified in Annex A, and are defined in terms of the processes
that these security programs are required to provide. Subclause 4.1.4 discusses the ability of
industry groups to subset these processes into profiles to address risk reduction. See
IEC 62443-3-2 for more detail on security risks.
This document also recognizes that security programs evolve and that processes go through a
lifecycle of their own, often starting as completely manual and evolving over time to become
more formal, more consistent, and more effective. Subclause 4.2 addresses this issue of
evolving processes by defining a maturity model to be used with the application of this
document.
EXAMPLE 2 A specific capability might be introduced as a set of manual procedures and then later supplemented
with automated tools.
As a result, the requirements in Annex A are stated abstractly, allowing for a wide range of
implementations. Integration service provider security program processes that meet these
requirements are used during the deployment, configuration, handover, and commissioning of
the Automation Solution, while maintenance service providers security program processes are
used to update and maintain the security of the Automation Solution once it becomes
operational.
It is expected that service providers and asset owners will negotiate and agree on which of
these required processes are to be provided and how they are to be provided. These aspects
of fulfilling the requirements are beyond the scope of this document, although the use of profiles
that are accepted by the asset owner and the service provider could make this easier.
EXAMPLE 3 A service provider can be capable of supporting complex passwords and also be capable of supporting
specific variations of complex passwords as defined by the password policies of asset owners.
EXAMPLE 4 Many processes have a timeliness aspect related to their performance that is agreed to by both the
asset owner and the service provider.
4.1.2 Use of this document by asset owners
This document can be used by asset owners to request specific security processes from the
service provider. More specifically, prior to such a request, this document can be used by asset
owners to determine whether or not a specific service provider’s security program includes the
processes that the asset owner needs.
In general, this document recognizes that asset owner requirements vary, so it has been written
to encourage service providers to implement the required processes so that they can be
adaptable to a wide variety of asset owners. For example, the asset owner can evaluate whether
the service provider’s security-related processes comply with the requirements of this
document, or the service provider can use a generic or "reference" architecture applicable to
the asset owner system to demonstrate its security program processes to the asset owner.
Many technical security capabilities may exist within a reference architecture that can be
applied to the Automation Solution during its integration, commissioning, and maintenance
cycles. The service provider's security program defines processes that can be performed to
adapt and match the Automation Solution to asset owner needs.
The maturity model also allows asset owners to better understand the maturity of a specific
service provider’s processes.
IEC 62443-2-4:2023 © IEC 2023 – 15 –
4.1.3 Use of this document during negotiations between asset owners and IACS
service providers
Prior to the service provider starting work on the Automation Solution, the asset owner normally
issues a Request for Quote (RFQ) that includes a set of documents (e.g. a Statement/Scope of
Work – SOW) that describes its security policies and defines its security program requirements
(see Annex A). See IEC 62443-3-2 for more information on asset owner security requirements
applied during system design. Service providers respond to the RFQ and negotiations follow in
which the service provider and the asset owner come to agreement on the details of the SOW
(or similar document). Typically, the specific responsibilities and processes of the service
pr
...








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...