OT Security

OT Security Standard IEC 62443

Share:
IEC

The Scope of IEC 62443 Standard

ISA/IEC 62443 has different series of standards. In addition to enabling upstream, midstream, and downstream manufacturers in various industrial control fields to have their own corresponding standards, when the standard is updated in the future, the certification only needs to be updated by certain organizations, instead of applying it to all manufacturers. For manufacturers, it can diversify information security risks, reduce the cost and manpower of implementing security standards, and can also be used when cybersecurity incidents occur, quickly find out the cause, and take appropriate measures.

Cyber Security in Industrial Automation and Control

Why ISA/IEC 62443

Cyber Security in Industrial Automation and Control (IACS)
  • It the system design is not secure enough and can not be solved by technical means, then appropriate management and procedures are required.
  • Enterprises highly rely on IT technologies. Consequently, they are not able to resist security threats and avoid risks.
  • Human is always the biggest problem in cyber security management.
  • The attack technologies are becoming more and more complex, and the attack sources are quite extensive.
  • Public and private networks are interconnected to share information, making access control more difficult.
  • The decentralized computer operation weakens the effect of centralized management.
 
Implementation Timeline

Implementation Timeline

Security Development Service of Industrial Automation and Control (IACS)
The methodology of International Standard IEC 62443-4-1 is adopted to assist in the establishment of the secure product development plan

1. Differentiation Analysis
  • Feasibility evaluation of cyber security operation
  • Product security test (Pretest)

2. IEC 62443 4-1 Implementation
  • Status interview
  • Organization establishment and policy formulation
  • Plan security workflow of product development

3. IEC 62443 4-2 Testing
  • Cyber security test training
  • Compliance testing
 

IEC 62443-4-1 Product Development Requirements

8 Practices, 47 Requirements
Why Medical Cybersecurity?
 
IEC 62443-4-2 Technical Security Requirements for IACS Components

IEC 62443-4-2 Technical Security Requirements for IACS Components

7 Foundational Requirements. 95 Security Requirements

  • IAC - Identification and Authentication Control
  • RA - Resource Availability
  • TRE - Timely Response to Event
  • RDF - Restricted Data Flow
  • DC - Data Confidentiality
  • SI - System Integrity
  • UC - User Control

 

Component Requirement (CR)

  • Software Application Requirement (SAR)
  • Embedded Device Requirement (EDR)
  • Host Device Requirement (HDR)
  • Network Device Requirement (NDR)
 

Inquiry

Contact Us
Thank you for visiting us. Please leave your contact information, and we will reply you as soon as we can.
  • Onward Security is committed to your privacy. Your information won't be shared with third parties and is used to contact you about relevant content. You may unsubscribe at any time. For more info, please read our Privacy Policy. By clicking below submit button, you consent to allow Onward Security to store and process the personal information submitted above to provide you the content requested.

Why Onward Security

In-depth Cybersecurity Techniques+

  • Uncovered 40+ zero-day vulnerabilities (CVE)
  • Discovered 3000+ IoT product vulnerabilities

Dedicated to IoT Product Security+

  • 150+ cybersecurity projects in IoT industry
  • Tested 700+ IoT product security

Global Compliance and Certification Capability+

  • 300+ customers / 10+ countries certification obtained
  • Compliance experience in IIoT, medical, automotive, BFSI, and consumer IoT industry
Subscribe to Newsletter:

Verification

Click the numbers in sequence.

WeChat
This site uses cookies to improve your experience and to provide content customized specifically to your interests. By continuing to browse our site without changing your cookie settings (click the Privacy Policy button for more info), or by clicking the Continue button, you hereby acknowledge and agree to our privacy policy and use of cookies.