SIST-TS CLC/TS 50701:2024
(Main)Railway applications - Cybersecurity
Railway applications - Cybersecurity
This document provides railway operators, system integrators and product suppliers, with guidance and specifications on how cybersecurity will be managed in the context of EN 50126 1 RAMS lifecycle process. This document aims at the implementation of a consistent approach to the management of the security of the railway systems. This document can also be applied to the security assurance of systems and components/equipment developed independently of EN 50126 1:2017.
This document applies to Communications, Signalling and Processing domain, to Rolling Stock and to Fixed Installations domains. It provides references to models and concepts from which requirements and recommendations can be derived and that are suitable to ensure that the residual risk from security threats is identified, supervised and managed to an acceptable level by the railway system duty holder. It presents the underlying security assumptions in a structured manner.
This document does not address functional safety requirements for railway systems but rather additional requirements arising from threats and related security vulnerabilities and for which specific measures and activities need to be taken and managed throughout the lifecycle. The aim of this document is to ensure that the RAMS characteristics of railway systems / subsystems / equipment cannot be reduced, lost or compromised in the case of cyber attacks.
The security models, the concepts and the risk assessment process described in this document are based on or derived from the IEC/EN IEC 62443 series. This document is consistent with the application of security management requirements contained within IEC 62443 2 1, which in turn are based on EN ISO/IEC 27001 and EN ISO 27002.
Bahnanwendungen - IT-Sicherheit
Applications ferroviaires - Cybersécurité
Železniške naprave - Kibernetska varnost
Ta dokument podaja smernice in specifikacije za upravljavce železniških naprav, integratorje sistemov in dobavitelje izdelkov v zvezi z upravljanjem kibernetske varnosti v kontekstu procesa življenjskega cikla RAMS iz standarda EN 50126-1. Cilj tega dokumenta je uvedba doslednega pristopa k upravljanju varnosti železniških sistemov. Uporabiti ga je mogoče tudi za zagotavljanje varnosti sistemov, komponent in opreme, razvitih neodvisno od standarda EN 50126.
Ta dokument se uporablja za komunikacijo, signaliziranje in obdelavo signalov, železniška vozna sredstva ter fiksne postroje. Vsebuje sklice na modele in koncepte, iz katerih je mogoče izpeljati zahteve oziroma priporočila in ki so primerni za zagotovitev, da oseba, ki je odgovorna za železniški sistem, zmore ustrezno prepoznati, nadzirati in upravljati preostalo tveganje zaradi varnostnih groženj. Osnovne varnostne predpostavke so v tem dokumentu strukturirano predstavljene.
Ta dokument ne obravnava zahtev glede funkcionalne varnosti za železniške sisteme, temveč dodatne zahteve, ki izhajajo iz varnostnih groženj in povezanih ranljivosti ter za katere je treba sprejeti posebne ukrepe in dejavnosti ter jih upravljati skozi celoten življenjski cikel. Namen te tehnične specifikacije je zagotoviti, da značilnosti RAMS železniških sistemov, podsistemov in opreme v primeru namernih napadov ni mogoče zmanjšati, izgubiti ali ogroziti.
Modeli varnosti, koncepti in postopek ocenjevanja tveganja, opisani v tem dokumentu, temeljijo na skupini standardov IEC 62443 oziroma iz nje izhajajo. Ta dokument je zlasti skladen z uporabo zahtev za upravljanje varnosti, ki jih vsebuje standard IEC 62443-2-1 ter ki temeljijo na standardih EN ISO 27001 in EN ISO 27002.
General Information
- Status
- Published
- Publication Date
- 12-Dec-2023
- Technical Committee
- ŽEN - Electrical applications for railways
- Current Stage
- 6060 - National Implementation/Publication (Adopted Project)
- Start Date
- 15-Nov-2023
- Due Date
- 20-Jan-2024
- Completion Date
- 13-Dec-2023
Relations
- Effective Date
- 01-Jan-2024
- Effective Date
- 05-Aug-2025
- Effective Date
- 31-Aug-2021
Overview
CLC/TS 50701:2023 - "Railway applications - Cybersecurity" provides guidance and specifications for managing cybersecurity across the railway RAMS lifecycle defined by EN 50126‑1. Intended for railway operators, system integrators, product suppliers and duty holders, the Technical Specification gives a consistent approach to identify, supervise and manage residual risk from cyber threats so that RAMS characteristics are not reduced or compromised by attacks. It applies to the Communications, Signalling and Processing, Rolling Stock and Fixed Installations domains and can be used for systems developed inside or outside EN 50126‑1:2017 processes.
Key Topics
- Lifecycle integration: cybersecurity activities synchronized with the EN 50126‑1 RAMS lifecycle, including deliverables and the cybersecurity management plan.
- System definition & initial risk assessment: define the System under Consideration (SuC), essential functions, assets, access and threat landscape.
- Detailed risk assessment: threat and vulnerability identification, impact & likelihood assessment, risk evaluation and derivation of Security Levels (SL) and SL‑targets (SL‑T).
- Security models & zoning: partitioning into zones and conduits, railway asset and physical architecture models, and defence‑in‑depth principles.
- Requirements & apportionment: derivation of cybersecurity requirements, allocation to subsystems and components, and compensating countermeasures.
- Assurance & acceptance: development of a cybersecurity case, verification and validation activities, independence for acceptance and handover.
- Operations & maintenance: vulnerability handling, security patch management and lifecycle maintenance while preserving availability and safety.
- Design guidance & legacy systems: informative annexes cover cybersecurity design principles, handling legacy equipment, safety‑security interactions and deliverable templates.
Applications
- Implementing a railway cybersecurity management framework aligned with RAMS lifecycle processes.
- Performing threat and risk assessments for signalling, on‑board systems, SCADA and communications.
- Defining zones/conduits and deriving security requirements down to component level.
- Preparing cybersecurity cases and evidence for system acceptance and operational handover.
- Managing vulnerabilities, patching and maintenance without compromising operational availability.
Who uses it: railway operators, safety and security engineers, system integrators, equipment manufacturers, certification and audit teams, and duty holders responsible for system safety and security.
Related Standards
- EN 50126‑1 (RAMS lifecycle)
- IEC/EN IEC 62443 series (industrial security, foundational to the models and controls referenced)
- IEC 62443‑2‑1 (security management requirements)
- EN ISO/IEC 27001 and EN ISO/IEC 27002 (information security management)
CLC/TS 50701:2023 is a practical bridge between railway RAMS practices and established industrial cybersecurity standards, helping teams protect railway systems against evolving cyber threats while maintaining safety and availability.
Frequently Asked Questions
SIST-TS CLC/TS 50701:2024 is a technical specification published by the Slovenian Institute for Standardization (SIST). Its full title is "Railway applications - Cybersecurity". This standard covers: This document provides railway operators, system integrators and product suppliers, with guidance and specifications on how cybersecurity will be managed in the context of EN 50126 1 RAMS lifecycle process. This document aims at the implementation of a consistent approach to the management of the security of the railway systems. This document can also be applied to the security assurance of systems and components/equipment developed independently of EN 50126 1:2017. This document applies to Communications, Signalling and Processing domain, to Rolling Stock and to Fixed Installations domains. It provides references to models and concepts from which requirements and recommendations can be derived and that are suitable to ensure that the residual risk from security threats is identified, supervised and managed to an acceptable level by the railway system duty holder. It presents the underlying security assumptions in a structured manner. This document does not address functional safety requirements for railway systems but rather additional requirements arising from threats and related security vulnerabilities and for which specific measures and activities need to be taken and managed throughout the lifecycle. The aim of this document is to ensure that the RAMS characteristics of railway systems / subsystems / equipment cannot be reduced, lost or compromised in the case of cyber attacks. The security models, the concepts and the risk assessment process described in this document are based on or derived from the IEC/EN IEC 62443 series. This document is consistent with the application of security management requirements contained within IEC 62443 2 1, which in turn are based on EN ISO/IEC 27001 and EN ISO 27002.
This document provides railway operators, system integrators and product suppliers, with guidance and specifications on how cybersecurity will be managed in the context of EN 50126 1 RAMS lifecycle process. This document aims at the implementation of a consistent approach to the management of the security of the railway systems. This document can also be applied to the security assurance of systems and components/equipment developed independently of EN 50126 1:2017. This document applies to Communications, Signalling and Processing domain, to Rolling Stock and to Fixed Installations domains. It provides references to models and concepts from which requirements and recommendations can be derived and that are suitable to ensure that the residual risk from security threats is identified, supervised and managed to an acceptable level by the railway system duty holder. It presents the underlying security assumptions in a structured manner. This document does not address functional safety requirements for railway systems but rather additional requirements arising from threats and related security vulnerabilities and for which specific measures and activities need to be taken and managed throughout the lifecycle. The aim of this document is to ensure that the RAMS characteristics of railway systems / subsystems / equipment cannot be reduced, lost or compromised in the case of cyber attacks. The security models, the concepts and the risk assessment process described in this document are based on or derived from the IEC/EN IEC 62443 series. This document is consistent with the application of security management requirements contained within IEC 62443 2 1, which in turn are based on EN ISO/IEC 27001 and EN ISO 27002.
SIST-TS CLC/TS 50701:2024 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security; 45.020 - Railway engineering in general. The ICS classification helps identify the subject area and facilitates finding related standards.
SIST-TS CLC/TS 50701:2024 has the following relationships with other standards: It is inter standard links to SIST-TS CLC/TS 50701:2021, oSIST prEN IEC 63452:2025, SIST-TS CLC/TS 50701:2021. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
SIST-TS CLC/TS 50701:2024 is associated with the following European legislation: EU Directives/Regulations: 2016/797/EU; Standardization Mandates: M/483. When a standard is cited in the Official Journal of the European Union, products manufactured in conformity with it benefit from a presumption of conformity with the essential requirements of the corresponding EU directive or regulation.
You can purchase SIST-TS CLC/TS 50701:2024 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of SIST standards.
Standards Content (Sample)
SLOVENSKI STANDARD
01-januar-2024
Železniške naprave - Kibernetska varnost
Railway applications - Cybersecurity
Bahnanwendungen - IT-Sicherheit
Applications ferroviaires - Cybersécurité
Ta slovenski standard je istoveten z: CLC/TS 50701:2023
ICS:
35.030 Informacijska varnost IT Security
45.020 Železniška tehnika na Railway engineering in
splošno general
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
TECHNICAL SPECIFICATION CLC/TS 50701
SPÉCIFICATION TECHNIQUE
TECHNISCHE SPEZIFIKATION August 2023
ICS 35.030; 45.020 Supersedes CLC/TS 50701:2021
English Version
Railway applications - Cybersecurity
Applications ferroviaires - Cybersécurité Bahnanwendungen - Cybersecurity
This Technical Specification was approved by CENELEC on 2023-06-19.
CENELEC members are required to announce the existence of this TS in the same way as for an EN and to make the TS available promptly
at national level in an appropriate form. It is permissible to keep conflicting national standards in force.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,
Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the
Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland,
Türkiye and the United Kingdom.
European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2023 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.
Ref. No. CLC/TS 50701:2023 E
Contents Page
European foreword . 6
Introduction . 7
1 Scope . 8
2 Normative references . 8
3 Terms, definitions and abbreviations . 8
3.1 Terms and definitions . 8
3.2 Abbreviations . 24
4 Railway system overview . 27
4.1 Introduction 27
4.2 Railway asset model 28
4.3 Railway physical architecture model 29
4.4 High-level railway zone model 30
5 Cybersecurity within a railway application lifecycle . 32
5.1 Introduction 32
5.2 Railway application and product lifecycles 32
5.3 Activities, synchronization, and deliverables 32
5.4 Cybersecurity context and cybersecurity management plan 36
5.5 Relationship between cybersecurity and essential functions 36
5.5.1 General . 36
5.5.2 Defence in depth . 36
5.5.3 Security-related application conditions . 37
5.5.4 Interfaces between cybersecurity and design team. 38
5.5.5 Interfaces between the safety and the cybersecurity processes . 38
5.6 Cybersecurity assurance process 41
6 System definition and initial risk assessment . 42
6.1 Introduction 42
6.2 Identification of the system under consideration 43
6.2.1 Definition of the SuC . 43
6.2.2 Overall functional description . 43
6.2.3 Access to the SuC . 43
6.2.4 Essential functions . 44
6.2.5 Assets supporting the essential functions . 44
6.2.6 Threat landscape . 44
6.3 Initial risk assessment 45
6.3.1 Impact assessment . 45
6.3.2 Likelihood assessment . 46
6.3.3 Risk evaluation . 47
6.4 Partitioning of the SuC 47
6.4.1 Criteria for zones and conduits breakdown . 47
6.4.2 Process for zones and conduits breakdown . 48
6.5 Output and documentation 49
6.5.1 Description of the system under consideration . 49
6.5.2 Documentation of the initial risk assessment . 49
6.5.3 Definition of zones and conduits . 49
7 Detailed risk assessment. 49
7.1 General aspects 49
7.2 Establishment of cybersecurity requirements 51
7.2.1 General . 51
7.2.2 Threat identification and vulnerability identification . 52
7.2.3 Vulnerability identification . 54
7.2.4 Risk acceptance principles . 55
7.2.5 Derivation of SL-T by explicit risk evaluation . 56
7.2.6 Determine initial SL . 58
7.2.7 Determine countermeasures from EN IEC 62443-3-3. 59
7.2.8 Risk estimation and evaluation . 60
7.2.9 Determine security level target . 61
7.2.10 Cybersecurity requirements specification for zones and conduits . 62
8 Cybersecurity requirements . 63
8.1 Objectives 63
8.2 System security requirements 63
8.3 Apportionment of cybersecurity requirements 79
8.3.1 Objectives . 79
8.3.2 Break down of system requirements to subsystem level . 80
8.3.3 System requirement allocation at component level . 80
8.3.4 Specific consideration for implementation of cybersecurity requirement on components . 81
8.3.5 Requirement breakdown structure as verification . 81
8.3.6 Compensating countermeasures . 81
9 Cybersecurity assurance and system acceptance for operation . 83
9.1 Overview 83
9.2 Cybersecurity case 84
9.3 Cybersecurity verification 85
9.3.1 General . 85
9.3.2 Cybersecurity integration and verification . 85
9.3.3 Assessment of results . 87
9.4 Cybersecurity validation 87
9.5 Cybersecurity system acceptance 88
9.5.1 Independence . 88
9.5.2 Objectives . 88
9.5.3 Activities . 88
9.5.4 Cybersecurity handover . 88
10 Operational, maintenance and disposal requirements . 89
10.1 Introduction 89
10.2 Vulnerability management 89
10.3 Security patch management 90
10.3.1 General . 90
10.3.2 Patching systems while ensuring operational requirements . 91
Annex A (informative) Handling conduits . 94
Annex B (informative) Handling legacy systems . 97
Annex C (informative) Cybersecurity design principles . 103
Annex D (informative) Safety and security . 132
Annex E (informative) Risk acceptance methods . 136
Annex F (informative) Railway architecture and zoning . 144
Annex G (informative) Cybersecurity deliverables content . 161
Bibliography . 164
Figures
Figure 1 — Segregation of IT and OT . 27
Figure 2 — Railway asset model (example) . 28
Figure 3 — Railway physical architecture model (example) . 29
Figure 4 — Generic high-level railway zone model (example) . 31
Figure 5 — Defence in depth with example of measures . 37
Figure 6 — Synchronisation between cybersecurity team and other stakeholders . 40
Figure 7 — Relationship Threat Risk Assessment and Security Assurance . 41
Figure 8 — Initial risk assessment flowchart . 42
Figure 9 — Detailed risk assessment flowchart . 52
Figure 10 — Explicit risk evaluation flowchart . 58
Figure 11 — Handling of SL-C . 82
Figure 12 — Cybersecurity assurance . 83
Figure 13 — Cybersecurity case concept . 84
Figure 14 — Cybersecurity assurance during integration and validation activities . 86
Figure 15 — General vulnerability handling flowchart . 90
Figure 16 — Vulnerability and outage time during system update (maintenance phase) [example] . 92
Figure 17 — Vulnerability and outage time during system update with observation phases [example] . 93
Figure A.1 — Zones and conduits example . 95
Figure D.1 — Security as an environmental condition for safety . 133
Figure F.1 — Adopted generic high-level railway zone model (example) . 151
Figure F.2 — Example of a railway system zone model . 152
Tables
Table 1 — Security-related activities within a railway application lifecycle (EN 50126-1) . 32
Table 2 — Examples of function related supporting assets in regard to the Defence in Depth layers . 37
Table 3 — Qualitative Impact Assessment example . 45
Table 4 — Likelihood assessment matrix – Example . 46
Table 5 — Risk matrix example . 47
Table 6 — System Security Requirements and Foundational Classes . 65
Table E.1 — Risk acceptance categories according to EN 50126-1 . 136
Table E.2 — Mapping severity categories according to EN 50126-1 to cybersecurity severity . 137
Table E.3 — Likelihood assessment criteria . 137
Table E.4 — Mapping Likelihood to accessibility and Probability . 138
Table E.5 — Impact assessment matrix – Example 2 . 139
Table E.6 — Likelihood assessment matrix – Example 2 . 140
Table E.7 — Risk acceptance matrix – Example 2 . 140
Table E.8 — Impact assessment matrix – Example 3 . 141
Table E.9 — Likelihood assessment matrix – Example 3 . 142
Table E.10 — Likelihood conversion table – Example 3 . 142
Table E.11 — Risk acceptance matrix – Example 3 . 142
Table E.12 — Risk severity / Mitigation matrix – Example 3 . 143
Table F.1 — Railway system glossary . 144
Table F.2 — Example – Evaluating groups of criticalities for landside-landside communication . 148
Table F.3 — Example – Zone criticality definition for landside-landside communication . 148
Table F.4 — Example – Landside-landside communication matrix basic structure . 149
Table F.5 — Example – Communication matrix - landside to landside. 150
Table F.6 — Example – Rolling stock zone model. 153
Table F.7 — Example – Communication matrix - rolling stock to rolling stock . 154
Table F.8 — Example – Communication matrix - landside to rolling stock . 157
Table F.9 — Example – Communication matrix - rolling stock to landside . 158
European foreword
This document (CLC/TS 50701:2023) has been prepared by CLC/TC 9X “Electrical and electronic
applications for railways”.
This document supersedes CLC/TS 50701:2021.
CLC/TS 50701:2021:
— 3.1: Addition or update of the definition of the following terms: air-gapped network, attack vector,
availability, code of practice, cybersecurity case, data diode, host, host device, intrusion, privilege,
railway operator, security device, security event, security objective, SCADA system, validation, virtual
routing and forwarding,
— 4.4: Update of legend of Figure 4.
— 5.3: Update of Table 1 content.
— 5.5.4: Recommendation added: to perform common design reviews between cybersecurity team and
design team.
— 5.5.5: Addition of Figure 6.
— 6.2.6: MITRE ATT&ACK for ICS added as example of threat library.
— 7.2.3.1: Note added: vulnerabilities are not always within hardware or software, they can also come
from configuration, organization and processes.
— 7.2.4.2: Requirement added: demonstration of applicability of code of practice shall be provided.
— 7.2.4.3: Requirement added: demonstration of applicability of reference system shall be provided.
— 8.2: “SR 1.4” railway note updated.
— B.4.6: Recommendation added: passive network monitoring is recommended as active network
monitoring may disrupt the availability of OT network.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CENELEC shall not be held responsible for identifying any or all such patent rights.
Any feedback and questions on this document should be directed to the users’ national committee. A
complete listing of these bodies can be found on the CENELEC website.
Introduction
The aim of this document is to introduce the requirements as well as recommendations to address
cybersecurity within the railway sector.
Due to digitization and the need for more performance and better maintainability, previously isolated
industrial systems are now connected to large networks and increasingly use standard protocols and
commercial components. Because of this evolution, cybersecurity becomes a key topic for these industrial
systems, including critical systems such as railway systems.
The purpose of this document is to provide a specification that can be used to demonstrate that the
system under consideration is appropriately cyber secured, has set appropriate Target Security Levels
and achieved them, and that the cyber security is maintained during it operation and maintenance by
demonstrating conformance to this TS.
This document intends to:
— provide requirements and guidance on cybersecurity activities and deliverables
— be adaptable and applicable to various system lifecycles
— be applicable for both safety and non-safety related systems
— identify interfaces between cybersecurity and other disciplines contributing to railway system
lifecycles
— be compatible and consistent with EN 50126-1 when it is applied to the system under consideration
— due to lifecycle differences between safety and cybersecurity, separate safety approval and
cybersecurity acceptance as much as possible
— identify the key synchronization points related to cybersecurity between system integrator and asset
owner
— provide harmonized and standardized way to express technical cybersecurity requirements
— provide cybersecurity design principles promoting simple and modular systems
— allow the usage of market products such as industrial COTS compliant with the
IEC/EN IEC 62443 series.
1 Scope
This document provides railway operators, system integrators and product suppliers, with guidance and
specifications on how cybersecurity will be managed in the context of EN 50126-1 RAMS lifecycle
process. This document aims at the implementation of a consistent approach to the management of the
security of the railway systems. This document can also be applied to the security assurance of systems
and components/equipment developed independently of EN 50126-1:2017.
This document applies to Communications, Signalling and Processing domain, to Rolling Stock and to
Fixed Installations domains. It provides references to models and concepts from which requirements and
recommendations can be derived and that are suitable to ensure that the residual risk from security
threats is identified, supervised and managed to an acceptable level by the railway system duty holder.
It presents the underlying security assumptions in a structured manner.
This document does not address functional safety requirements for railway systems but rather additional
requirements arising from threats and related security vulnerabilities and for which specific measures and
activities need to be taken and managed throughout the lifecycle. The aim of this document is to ensure
that the RAMS characteristics of railway systems / subsystems / equipment cannot be reduced, lost or
compromised in the case of cyber attacks.
The security models, the concepts and the risk assessment process described in this document are based
on or derived from the IEC/EN IEC 62443 series. This document is consistent with the application of
security management requirements contained within IEC 62443-2-1, which in turn are based on
EN ISO/IEC 27001 and EN ISO 27002.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
EN 50126-1, Railway Applications - The Specification and Demonstration of Reliability, Availability,
Maintainability and Safety (RAMS) - Part 1: Generic RAMS Process
EN IEC 62443-3-2, Security for industrial automation and control systems - Part 3-2: Security risk
assessment for system design
EN IEC 62443-3-3, Industrial communication networks - Network and system security - Part 3-3: System
security requirements and security levels
IEC 62443-2-1, Industrial communication networks - Network and system security - Part 2-1: Establishing
an industrial automation and control system security program
3 Terms, definitions and abbreviations
3.1 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online Browsing Platform: available at https://www.iso.org/obp
— IEC Electropedia: available at https://www.electropedia.org/
NOTE The correspondence of the terms IACS, Solution and System used in the IEC/EN IEC 62443 series with
the terms in this document might need further clarification in future issues of this document. Particularly, when using
EN IEC 62443 definitions and requirements, the term “IACS” is understood and replaced by “railway application” or
“railway system” as relevant in the context.
3.1.1
acceptance
status achieved by a product, system or process once it has been
agreed that it is suitable for its intended purpose
[SOURCE: EN 50126-1:2017, 3.1]
3.1.2
access
ability and means to communicate with or otherwise interact with a system in order to
use system resources
Note 1 to entry: Access may involve physical access (authorization to be allowed physically in an area, possession
of a physical key lock, PIN code, or access card or biometric attributes that allow access) or logical access
(authorization to log in to a system and application, through a combination of logical and physical means).
3.1.3
access control
protection of system resources against unauthorized access
[SOURCE: EN IEC 62443-4-1:2018, 3.1.2]
3.1.4
access control process
process by which use of system resources is regulated according to a security policy and is permitted by
only authorized entities (users, programs, processes, or other systems) according to that policy
Note 1 to entry: Access control includes identification and authentication requirements specified in other parts of
the IEC/EN IEC 62443 series.
[SOURCE: EN IEC 62443-4-1:2018, 3.1.3 modified, “process” added]
3.1.5
accident
unintended event or series of events that results in death, injury, loss of a system or service, or
environmental damage
[SOURCE: IEC 60050 821:2017, 821-12-02]
3.1.6
achieved security level
measure of the security level achieved in the deployed security architecture, elsewhere, sometimes
referred to as the “as-built” security level
Note 1 to entry: Actual security level will vary over time based on natural degradations, induced events and
maintenance of security mechanisms.
3.1.7
air gapped network
network which is physically and logically isolated in a way that no external unit, e.g.
used for a Cyber-attack, can address any internal unit of this network
Note 1 to entry: Nevertheless, it might be possible to exchange data with such an air gapped network via a
dedicated interface, e.g. mobile storage devices (USB stick).
3.1.8
application
software program executing on the infrastructure that is used to interface with the process of the control
system itself
Note 1 to entry: Attributes include executable, typically execute on personal computers (PCs) or embedded
controllers.
Note 2 to entry: This definition does not apply to the term “Railway Application”.
3.1.9
approval
permission for a product or process to be marketed or used for stated purposes or under stated conditions
Note 1 to entry: Approval can be based on fulfilment of specified requirements or completion of specified
procedures.
[SOURCE: IEC 60050-902:2013, 902-06-01]
3.1.10
asset
physical or logical object owned by or under the custodial duties of an organization and having either a
perceived or actual value to the organization
[SOURCE: IEC 62443-2-1:2010, 3.1.3]
3.1.11
asset owner
individual or organization responsible for one or more IACS
Note 1 to entry: In the context of this document, an asset owner is a railway duty holder.
[SOURCE: EN IEC 62443-4-1:2018, 3.1.6, modified – Note 1 to entry has been added]
3.1.12
attack
attempt to gain access to an information processing system in order to produce damage
Note 1 to entry: The damage can be e.g. destruction, disclosure, alteration, disruption, unauthorized use.
[SOURCE: IEC 60050-171:2019, 171-08-12, modified, “disruption” added to Note 1 to entry]
3.1.13
attack surface
physical and functional interfaces of a system that can be accessed and, therefore, potentially exploited
Note 1 to entry: The size of the attack surface for a software interface is proportional to the number of methods and
parameters defined for the interface. Simple interfaces, therefore, have smaller attack surfaces than complex
interfaces.
Note 2 to entry: The size of the attack surface and the number of vulnerabilities are not necessarily related to each
other.
[SOURCE: EN IEC 62443-2-4:2019, 3.1.2]
3.1.14
attack vector
method or means by which an attacker can gain access to the system under consideration in order to
deliver a payload or malicious outcome
Note 1 to entry: Attack vectors enable attackers to exploit the vulnerabilities of the system under consideration,
including the human element.
Note 2 to entry: Examples of attack vectors include and not limited to USB key, e-mail attachment, wireless
connection, compromised credentials, phishing, man in the middle attack, etc.
3.1.15
audit
systematic, independent, documented process for obtaining records, statements of fact or other relevant
information and assessing them objectively to determine the extent to which specified requirements are
fulfilled
[SOURCE: IEC 60050-902:2013, 902-03-04, modified – Note 1 to entry has been removed]
3.1.16
authentication
provision of assurance that a claimed characteristic of an identity is correct
Note 1 to entry: Not all credentials used to authenticate an identity are created equally. The trustworthiness of the
credential is determined by the configured authentication mechanism. Hardware or software-based mechanisms can
force users to prove their identity before accessing data on a device. A typical example is proving the identity of a
user usually through an identity provider.
Note 2 to entry: Authentication is usually a prerequisite to allowing access to resources in a control system.
[SOURCE: EN IEC 62443-4-1:2018, 3.1.9]
3.1.17
authorization
right or a permission that is granted to a system entity to access a system resource
[SOURCE: IEC/TR 62443-3-1:2009, 3.1.7]
3.1.18
availability
ability to be in a state to perform as required
[SOURCE: IEC 60050-192:2015, 192-01-23, modified – The Notes 1 and 2 to entry have been omitted]
3.1.19
boundary
software, hardware, or other physical barrier that limits access to a system or part of a system
3.1.20
boundary device
communication security asset, within a zone or conduit, that provides a protected interface between a
zone and a conduit
3.1.21
code of practice
written set of rules, validated by a group of experts, that, when correctly applied, can
be used to control one or more specific threats
[SOURCE: CSM Regulation N° 402/2013, modified, “validated by a group of experts” added, and
“hazards” replaced by “threats”]
3.1.22
communication channel
specific logical or physical communication link between assets
Note 1 to entry: A channel facilitates the establishment of a connection.
[SOURCE: EN IEC 62443-3-3:2019 , 3.1.9]
3.1.23
communication path
logical connection between a source and one or more destinations, which could be devices, physical
processes, data items, commands, or programmatic interfaces
Note 1 to entry: The communication path is not limited to wired or wireless networks, but includes other means of
communication such as memory, procedure calls, state of physical plant, portable media, and human interactions.
3.1.24
compensating countermeasure
countermeasure employed in lieu of or in addition to inherent security capabilities to satisfy one or more
security requirements
EXAMPLE
— (component-level): locked cabinet around a controller that does not have sufficient cyber access control
countermeasures.
— (control system/zone-level): physical access control (guards, gates and guns) to protect a control room to restrict
access to a group of known personnel to compensate for the technical requirement for personnel to be uniquely
identified by the IACS.
— (component-level): a vendor’s programmable logic controller (PLC) cannot meet the access control capabilities
from an end-user, so the vendor puts a firewall in front of the PLC and sells it as a system.
[SOURCE: EN IEC 62443-4-2:2019, 3.1.9]
3.1.25
compromise
violation of the security of a system such that an unauthorized disclosure or modification on sensitive
information may have occurred, or unauthorized behaviour of the controlled physical process may have
occurred
As impacted by EN IEC 62443-3-3:2019/AC:2019-10.
3.1.26
conduit
logical grouping of communication channels, between connecting two or more zones,
that share common security requirements
Note 1 to entry: A conduit is allowed to traverse a zone as long as the security of the channels contained within the
conduit is not impacted by the zone.
[SOURCE: EN IEC 62443-4-2:2019, 3.1.11]
3.1.27
confidentiality
assurance that information is not disclosed to unauthorized individuals, processes, or
devices
Note 1 to entry: When used in the context of an IACS, confidentiality refers to protecting IACS data and information
from unauthorized access.
[SOURCE: EN IEC 62443-4-2:2019, 3.1.12]
3.1.28
connection
association established between two or more endpoints which supports the
establishment of a session
[SOURCE: EN IEC 62443-4-2:2019, 3.1.13]
3.1.29
control network
time-critical network that is typically connected to equipment that controls physical processes
Note 1 to entry: The control network can be subdivided into zones, and there can be multiple separate control
networks within one company or site.
3.1.30
control system
hardware and software components of an IACS
Note 1 to entry: Control systems are composed of field devices, embedded control devices, network devices, and
host devices (including workstations and servers).
[SOURCE: EN IEC 62443-3-3:2019 , 3.1.16, modified – Note 1 to entry has been added]
3.1.31
countermeasure
action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating
or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective
action can be taken
Note 1 to entry: The term “control” is also used to describe this concept in some contexts. The term
countermeasure has been chosen for this standard to avoid confusion with the term “control” in the context of “process
control” and “control system”.
[SOURCE: EN IEC 62443-3-3:2019 , 3.1.17]
3.1.32
cybersecurity
set of activities and measures taken with the objective to identify, protect against,
detect, respond to, and recover from unauthorized access or cyberattack which could lead to an accident,
an unsafe situation, or railway application performance degradation
Note 1 to entry: It is recognized that the term “cybersecurity” has a broader meaning in other standards and
guidance, often including non-malevolent threats, human errors, and protection against natural disasters. Those
aspects, except human errors degrading security controls, are not included in this document.
3.1.33
cybersecurity case
documented demonstration that the system under consideration complies with the specified security
requirements and that appropriate design /operation processes and organisation have been implemented
3.1.34
data diode
network appliance or device allowing data to travel only in one direction
Note 1 to entry: data diode can be either of the physical or logical type
3.1.35
Defence in Depth
approach to defend the system against any particular attack using several independent methods
Note 1 to entry: Defence in depth implies layers of security and detection, even on single systems, and provides
the following features:
— is based on the idea that any one layer of protection, may and probably will be defeated;
— attackers are faced with breaking through or bypassing each layer without being detected;
— a flaw in one layer can be mitigated by capabilities in other layers;
— system security becomes a set of layers within the overall network security; and
— each layer should be autonomous and not rely on the same functionality nor have the same failure modes as the
other layers.
[SOURCE: EN IEC 62443-4-1:2018, 3.1.15, modified – defense has been replaced by defence]
3.1.36
demilitarized zone
common, limited network of servers joining two or more zones for the purpose of controlling data flow
between zones
Note 1 to entry: Demilitarized zones (DMZs) are typically used to avoid direct connections between different zones.
[SOURCE: EN IEC 62443-3-3:2019 , 3.1.19]
3.1.37
denial of service
prevention or interruption of authorized access to a system resource or the delaying of system operations
and functions
[SOURCE: IEC/TR 62443-3-1:2009, 3.1.21]
3.1.38
digital signature
result of a cryptographic transformation of data which, when properly implemented,
provides the services of origin authentication, data integrity, and signer non-repudiation
[SOURCE: IEC/TR 62443-3-1:2009, 3.1.22]
3.1.39
encryption
transformation of data in order to hide their semantic content using cryptography
Note 1 to entry: The reverse process is called decryption.
[SOURCE: IEC 60050-171:2019, 171-08-09]
3.1.40
essential function
function or capability that is required to maintain health, safety, the environment and availability for the
equipment under control
Note 1 to entry: Essential functions include, but are not limited to, the safety instrumented function (SIF), the control
function and the ability of the operator to view and manipulate the equipment under control. The loss of essential
functions is commonly termed loss of protection, loss of control and loss of view respectively. In some industries
additional functions such as history can be considered essential.
[SOURCE: EN IEC 62443-4-2:2019, 3.1.20]
3.1.41
firewall
functional unit that mediates all traffic between two networks and protects one of them or some part
thereof against unauthorized access
[SOURCE: IEC 60050-732:2010, 732-06-01, modified – The notes to entry have been omitted]
3.1.42
gateway
functional unit that connects two computer networks with different network
architectures and protocols
[SOURCE: IEC 60050-732:2010, 732-01-17, modified – The notes to entry have been omitted]
3.1.43
handover
act of turning a railway solution over to the asset owner
Note 1 to entry: Handover effectively transfers responsibility for operations and maintenance of a railway solution
from the integration service provider to the asset owner and generally occurs after successful completion of system
test, often referred to as Site Acceptance Test (SAT).
3.1.44
host
computer that is attached to a communication subnetwork or inter-network and can
use services provided by the network to exchange data with other attached systems
3.1.45
host device
general purpose device running an operating system (for example Microsoft Windows
OS or Linux) capable of hosting one or more software applications, data stores or functions from one or
more suppliers
Note 1 to entry: Typical attributes include filesystem(s), programmable services, no real time scheduler and full
HMI (keyboard, mouse, etc.)
[SOURCE: EN IEC 62443-4-2:2019, 3.1.23]
3.1.46
impact
evaluated consequence of a particular event
Note 1 to entry: Impact may be expressed in terms of numbers of injuries and/or fatalities, extent of environmental
damage and/or magnitude of losses such as property damage, material loss, loss of intellectual property, lost
production, market share loss, reputation loss, and recovery costs.
[SOURCE: EN IEC 62443-3-3:2019 , 3.1.27, modified – Note 1 to entry has been added]
3.1.47
incident
event that is not part of the expected operation of a system or service that causes, or
may cause, an interruption to, or a reduction in, the quality of the service provided by the control system
[SOURCE: EN IEC 62443-3-3:2019 , 3.1.28]
3.1.48
integration service provider
service provider that provides integration activities for an automation solution including design,
installation, configuration, testing, commissioning, and handover
Note 1 to entry: Integration service providers are often referred to as integrators or Main Automation Contractors
(MAC).
[SOURCE: EN IEC 62443-2-4:2019, 3.1.9]
3.1.49
integrity
property that sensitive data has not been modified or deleted in an unauthorized and undetected
manner
[SOURCE: IEC 60050-171:2019, 171-08-05, modified – “of data that have not been altered or destroyed”
has been replaced with “that sensitive data has not been modified or deleted”]
3.1.50
intrusion
security event, or a combination of multiple security events, that constitutes a security
incident in which an intruder gains, or attempts to gain, access to a system or system resource without
having authorization to do so
[SOURCE: RFC 4949 Internet Security Glossary, Version 2]
3.1.51
intrusion detection
security service that monitors and analyses system events for the purpose of finding, and providing real-
time or near real-time warning of, attempts to access system resources in an unauthorized manner
3.1.52
least privilege
basic principle that holds that users (humans, software processes or devices) should be assigned the
fewest privileges consistent with their assigned duties and functions
Note 1 to entry: Least privilege is commonly implemented as a set of roles in an IACS.
[SOURCE: EN IEC 62443-4-2:2019, 3.1.28]
3.1.53
legacy system
any kind of system which is already in operation
3.1.54
likelihood
weighted factor based on a subjective analysis of the probability that a given threat is
capable of exploiting a given vulnerability or a set of vulnerabilities
[SOURCE: NIST SP 800-30: September 2012]
3.1.55
non-repudiation
ability to prove the occurrence of a claimed event or action and its originating entities
Note 1 to entry: The purpose of non-repudiation is to re
...
SIST-TS CLC/TS 50701:2024は、鉄道業界におけるサイバーセキュリティ管理に関する標準であり、鉄道オペレーター、システムインテグレーターおよび製品サプライヤーに向けてのガイダンスと仕様を提供しています。この文書の重要なポイントは、EN 50126 1 RAMSライフサイクルプロセスの文脈において、サイバーセキュリティをどのように管理するかに焦点を当てており、鉄道システムのセキュリティ管理に対して一貫したアプローチの実施を目指している点です。 本標準の適用範囲は、通信、信号処理及びプロセッシング領域、ボギー車両、固定設備に対して広がっています。システム責任者がセキュリティ脅威からの残留リスクを特定し、監視し、管理するために必要な要件及び推奨事項のモデルや概念を提供しており、これにより安全な鉄道運行が保証されます。また、文書内では、基礎的なセキュリティ仮定を体系的に提示している点も強調されます。 SIST-TS CLC/TS 50701:2024は、鉄道システムの機能的安全要件には直接関与しませんが、脅威や関連するセキュリティの脆弱性から生じる追加要件、及びライフサイクル全体にわたって管理すべき具体的な措置と活動について言及しています。この標準の目的は、サイバー攻撃が発生した場合に鉄道システム/サブシステム/機器のRAMS特性が低下したり、失われたり、侵害されたりすることがないようにすることです。 さらに、文書では、IEC/EN IEC 62443シリーズに基づいたセキュリティモデルや概念、リスクアセスメントプロセスを詳述しており、IEC 62443 2 1に含まれるセキュリティ管理要件と整合性が取れていることが確認できます。这些要件基于EN ISO/IEC 27001及びEN ISO 27002に基づいています。このように、SIST-TS CLC/TS 50701:2024は、鉄道業界におけるサイバーセキュリティの確保に極めて重要な役割を果たす標準であり、業界内での適用が期待されます。
Le document SIST-TS CLC/TS 50701:2024 traite des applications ferroviaires en matière de cybersécurité, offrant un cadre essentiel pour les opérateurs ferroviaires, les intégrateurs de systèmes et les fournisseurs de produits. Ce texte établit des lignes directrices et des spécifications concernant la gestion de la cybersécurité dans le cadre du processus de cycle de vie RAMS tel que défini par la norme EN 50126-1. L'un des points forts de cette norme est son approche systématique et cohérente pour la gestion de la sécurité des systèmes ferroviaires. En fournissant des références aux modèles et concepts pertinents, la norme permet de dériver des exigences et des recommandations adéquates afin d'identifier, de superviser et de gérer le risque résiduel des menaces de sécurité à un niveau acceptable. Ce cadre est crucial pour assurer que les systèmes ferroviaires, leurs sous-systèmes et équipements ne voient pas leurs caractéristiques RAMS compromettre en cas d'attaques cybernétiques. La portée du document englobe divers domaines, y compris les communications, la signalisation et le traitement, ainsi que le matériel roulant et les installations fixes. Cela garantit une couverture complète des différentes facettes de l'infrastructure ferroviaire, démontrant ainsi son importance et sa pertinence dans la gestion moderne des risques. Bien que le document ne traite pas des exigences de sécurité fonctionnelle pour les systèmes ferroviaires, il aborde les exigences supplémentaires résultant des menaces et des vulnérabilités de sécurité associées, appelant à la mise en œuvre de mesures spécifiques tout au long du cycle de vie. Cette distinction est essentielle pour élaborer une stratégie de cybersécurité robuste qui répond aux défis contemporains auxquels le secteur ferroviaire est confronté. En outre, les modèles de sécurité, les concepts et le processus d'évaluation des risques décrits dans cette norme s'appuient sur la série IEC/EN IEC 62443, et sont en accord avec les exigences de gestion de sécurité contenues dans l’IEC 62443-2-1, basées sur les normes EN ISO/IEC 27001 et EN ISO 27002. Cela garantit que le document est aligné avec des standards de sécurité de haut niveau, renforçant ainsi sa crédibilité et son efficacité dans la mise en œuvre de pratiques de cybersécurité robustes au sein des systèmes ferroviaires.
표준 문서 SIST-TS CLC/TS 50701:2024는 철도 애플리케이션에서 사이버 보안 관리에 대한 포괄적인 지침을 제공하며, EN 50126 1 RAMS 생애주기 프로세스와의 연계를 다룹니다. 이 문서는 철도 운영자, 시스템 통합자 및 제품 공급자에게 일관된 보안 관리 접근 방식을 구현하도록 돕기 위해 설계되었습니다. 이 표준의 강점 중 하나는 통신, 신호, 처리 영역뿐만 아니라, 차량과 고정 설치 영역에도 적용 가능하다는 것입니다. 이를 통해 사용자는 사이버 위협으로부터 발생할 수 있는 잔여 위험을 식별하고 관리할 수 있는 체계적인 방법을 마련할 수 있습니다. 이 표준은 철도 시스템의 책임자가 관리할 수 있는 수준에서 보안 위험을 감독하고 관리하는 데 필요한 모델과 개념을 참조합니다. 또한, SIST-TS CLC/TS 50701:2024는 철도 시스템에 대한 기능 안전 요구 사항을 다루지는 않지만, 위협과 관련된 보안 취약점으로부터 발생하는 추가 요구 사항을 제시합니다. 이를 통해 사이버 공격이 발생하더라도 RAMS 특성이 손실되거나 손상되지 않도록 보장할 수 있습니다. 이 문서에 포함된 보안 모델, 개념 및 위험 평가 프로세스는 IEC/EN IEC 62443 시리즈에 기반하고 있으며, 이는 EN ISO/IEC 27001 및 EN ISO 27002를 기반으로 하는 보안 관리 요구 사항과 일관성을 유지하고 있습니다. 이러한 사항들은 표준이 철도의 사이버 보안을 효과적으로 관리하는 데 있어 높은 관련성을 가지도록 하고 있습니다. SIST-TS CLC/TS 50701:2024는 철도 시스템의 안전성과 보안을 함께 보장하는 중요한 도구로서, 업계 내에서의 사이버 보안 체계 구축에 기여할 것입니다.
The SIST-TS CLC/TS 50701:2024 standard addresses critical cybersecurity concerns within the railway sector, establishing a comprehensive framework for managing cybersecurity risks. The document is explicitly designed for railway operators, system integrators, and product suppliers, making it highly relevant in the increasingly interconnected landscape of railway operations. One of the key strengths of this standard is its alignment with the EN 50126 1 RAMS lifecycle process. This ensures that the management of cybersecurity is not siloed but integrated into the broader reliability, availability, maintainability, and safety (RAMS) processes. This integration is vital in fostering a consistent approach to cybersecurity management, thereby enhancing the resilience of railway systems against cyber threats. Additionally, the standard’s applicability to the Communications, Signalling and Processing domain, as well as to Rolling Stock and Fixed Installations, demonstrates its extensive scope and versatility. By providing references to models and concepts that facilitate the identification and management of residual risks, the document ensures that railway system duty holders can proactively address potential security vulnerabilities. Another notable aspect of this standard is its focus on the cybersecurity of independently developed systems and components outside of the EN 50126 1:2017 framework. This inclusiveness widens the relevance of the guidelines, accommodating a range of practices in cybersecurity assurance. While the document does not delve into functional safety requirements, it effectively outlines additional cybersecurity requirements that arise specifically from identified threats and vulnerabilities. This distinction is crucial in ensuring that the RAMS characteristics of railway systems are safeguarded against cyber attacks, thus emphasizing the standard’s proactive risk management philosophy. Furthermore, the standard draws on established security models and risk assessment processes derived from the IEC/EN IEC 62443 series, ensuring that its recommendations are grounded in recognized best practices in cybersecurity management. The consistency with IEC 62443 2-1, based on EN ISO/IEC 27001 and EN ISO 27002, further lends credibility to the guidelines and encourages its adoption among stakeholders. Overall, the SIST-TS CLC/TS 50701:2024 standard is a vital resource in the realm of railway applications cybersecurity, promoting a structured and systematic approach to managing cybersecurity risks in railway systems. Its comprehensive scope, alignment with established frameworks, and focus on relevant threats position it as an essential guide for enhancing cybersecurity practices within the railway sector.
Die Norm SIST-TS CLC/TS 50701:2024 bietet eine umfassende Grundlage für die Sicherheitsmanagementprozesse im Bereich der Eisenbahnanwendungen, insbesondere in Bezug auf Cybersecurity. Ihr Anwendungsbereich umfasst sowohl Eisenbahnbetreiber als auch Systemintegratoren und Produktlieferanten, was die Relevanz der Norm für verschiedene Akteure im Eisenbahnbereich unterstreicht. Ein zentrales Merkmal der Norm ist ihre Ausrichtung auf den EN 50126 1 RAMS-Lifecycle-Prozess. Dadurch wird sichergestellt, dass die Cybersecurity in allen Phasen des Lebenszyklus von Schienenfahrzeugen und -systemen integriert und kontinuierlich verwaltet wird. Die Norm fördert die Implementierung eines konsistenten Ansatzes zur Sicherheitsverwaltung, was für die Stabilität und Zuverlässigkeit von Eisenbahnsystemen von entscheidender Bedeutung ist. Die Dokumentation diskutiert spezifische Anforderungen und Maßnahmen, die im Zusammenhang mit Bedrohungen und Sicherheitsanfälligkeiten zu berücksichtigen sind. Es werden Modelle und Konzepte bereitgestellt, die es ermöglichen, Anforderungen abzuleiten und Empfehlungen auszusprechen, die dafür sorgen, dass das verbleibende Risiko aus Sicherheitsbedrohungen identifiziert, überwacht und auf ein akzeptables Niveau verwaltet wird. Die strukturierte Darstellung von Sicherheitsannahmen ist ein weiterer Pluspunkt dieser Norm, da sie eine klare Orientierung für die beteiligten Akteure bietet. Ein weiterer Vorteil der Norm ist ihre Anwendung auf Kommunikations-, Signal- und Verarbeitungsdomänen sowie auf die Bereiche Rollmaterial und feste Anlagen. Obwohl die Norm nicht die funktionalen Sicherheitsanforderungen für Eisenbahnsysteme behandelt, bietet sie dennoch wichtige technische Vorgaben, um sicherzustellen, dass die RAMS-Eigenschaften nicht durch Cyberangriffe gefährdet werden. Die Sicherheitsmodelle und der Risikoassessierungsprozess basieren auf der IEC/EN IEC 62443-Serie und sind eng mit den Sicherheitsmanagementanforderungen der IEC 62443 2 1 verknüpft, die wiederum auf EN ISO/IEC 27001 und EN ISO 27002 basieren. Dies sorgt für eine hohe Kompatibilität und eine fundierte Grundlage in Bezug auf international anerkannte Sicherheitsstandards. Insgesamt ist die Norm SIST-TS CLC/TS 50701:2024 ein wesentliches Dokument für die Cybersecurity im Eisenbahnsektor, das nicht nur die Sicherheit von Eisenbahnsystemen stärkt, sondern auch die Zusammenarbeit zwischen verschiedenen Stakeholdern fördert. Die Bereitstellung klarer Richtlinien und Empfehlungen stellt sicher, dass die Eisenbahninfrastruktur gegen die Herausforderungen der digitalen Bedrohungen gut gerüstet ist.










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...