CLC/TC 65X/WG 03 - Cyber Security
Provisional scope: - Observing the Cyber Security activities on IEC, ISO and other standardization bodies and fora - Being the TC 65X contact for the CEN/CLC JTC13
Cyber Security
Provisional scope: - Observing the Cyber Security activities on IEC, ISO and other standardization bodies and fora - Being the TC 65X contact for the CEN/CLC JTC13
General Information
Frequently Asked Questions
CLC/TC 65X/WG 03 is a Working Group within CLC. It is named "Cyber Security" and is responsible for: Provisional scope: - Observing the Cyber Security activities on IEC, ISO and other standardization bodies and fora - Being the TC 65X contact for the CEN/CLC JTC13 This committee has published 2 standards.
CLC/TC 65X/WG 03 develops CLC standards in the area of Information technology. The scope of work includes: Provisional scope: - Observing the Cyber Security activities on IEC, ISO and other standardization bodies and fora - Being the TC 65X contact for the CEN/CLC JTC13 Currently, there are 2 published standards from this working group.
CLC is a standardization organization that develops and publishes standards to support industry, commerce, and regulatory requirements.
A Working Group in CLC is a specialized group responsible for developing standards or technical work within a defined scope. These bodies bring together international experts to create consensus-based standards that support global trade, safety, and interoperability.
This part of IEC 62443 specifies the evaluation methodology to support interested parties (e.g. during conformity assessment activities) to achieve repeatable and reproducible evaluation results against IEC 62443-2-4 requirements. This document is intended for first-party, secondparty or third-party conformity assessment activity, for example by product suppliers, service providers, asset owners and conformity assessment bodies. NOTE 1 62443-2-4 specifies requirements for security capabilities of an IACS service provider. These security capabilities can be offered as a security program during integration and maintenance of an automation solution. NOTE 2 The term “conformity assessment” and the terms first-party conformity assessment activity, second-party conformity assessment activity and third-party conformity assessment activity are defined in ISO/IEC 17000.
- Technical specification135 pagesEnglish languagee-Library read for1 day
This part of IEC 62443 specifies a scheme for defining (selecting, writing, drafting, creating) IEC 62443 security profiles. This scheme and its specified requirements apply to IEC 62443 security profiles which are planned to be published as part of the upcoming IEC 62443 dedicated security profiles subseries. IEC 62443 security profiles can support interested parties (e.g. during conformity assessment activities) to achieve comparability of assessed IEC 62443 requirements.
- Technical specification18 pagesEnglish languagee-Library read for1 day