{"id":245277,"date":"2024-10-19T16:07:50","date_gmt":"2024-10-19T16:07:50","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-62443-3-32019\/"},"modified":"2024-10-25T11:07:44","modified_gmt":"2024-10-25T11:07:44","slug":"bs-en-iec-62443-3-32019","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-62443-3-32019\/","title":{"rendered":"BS EN IEC 62443-3-3:2019"},"content":{"rendered":"

This part of the IEC 62443<\/span> <\/span> series provides detailed technical control system requirements (SRs) associated with the seven foundational requirements (FRs) described in IEC 62443\u20111\u20111<\/span> <\/span> including defining the requirements for control system capability security levels, SL-C(control system). These requirements would be used by various members of the industrial automation and control system (IACS) community along with the defined zones and conduits for the system under consideration (SuC) while developing the appropriate control system target SL, SL-T(control system), for a specific asset.<\/p>\n

As defined in IEC 62443\u20111\u20111<\/span> <\/span> there are a total of seven FRs:<\/p>\n

    \n
  1. \n

    Identification and authentication control (IAC),<\/p>\n<\/li>\n

  2. \n

    Use control (UC),<\/p>\n<\/li>\n

  3. \n

    System integrity (SI),<\/p>\n<\/li>\n

  4. \n

    Data confidentiality (DC),<\/p>\n<\/li>\n

  5. \n

    Restricted data flow (RDF),<\/p>\n<\/li>\n

  6. \n

    Timely response to events (TRE), and<\/p>\n<\/li>\n

  7. \n

    Resource availability (RA).<\/p>\n<\/li>\n<\/ol>\n

    These seven requirements are the foundation for control system capability SLs, SL-C (control system). Defining security capability at the control system level is the goal and objective of this standard as opposed to target SLs, SL-T, or achieved SLs, SL-A, which are out of scope.<\/p>\n

    See IEC 62443\u20112\u20111<\/span> <\/span> for an equivalent set of non-technical, program-related, capability SRs necessary for fully achieving a control system target SL.<\/p>\n

    PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
    PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
    2<\/td>\nundefined <\/td>\n<\/tr>\n
    5<\/td>\nAnnex ZA(normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n
    7<\/td>\nCONTENTS <\/td>\n<\/tr>\n
    14<\/td>\nFOREWORD <\/td>\n<\/tr>\n
    16<\/td>\n0 Introduction
    0.1 Overview <\/td>\n<\/tr>\n
    17<\/td>\n0.2 Purpose and intended audience
    0.3 Usage within other parts of the IEC 62443 series <\/td>\n<\/tr>\n
    18<\/td>\nFigures
    Figure 1 \u2013 Structure of the IEC 62443 series <\/td>\n<\/tr>\n
    19<\/td>\n1 Scope
    2 Normative references
    3 Terms, definitions, abbreviated terms, acronyms, and conventions
    3.1 Terms and definitions <\/td>\n<\/tr>\n
    25<\/td>\n3.2 Abbreviated terms and acronyms <\/td>\n<\/tr>\n
    27<\/td>\n3.3 Conventions
    4 Common control system security constraints
    4.1 Overview <\/td>\n<\/tr>\n
    28<\/td>\n4.2 Support of essential functions
    4.3 Compensating countermeasures <\/td>\n<\/tr>\n
    29<\/td>\n4.4 Least privilege
    5 FR 1 \u2013 Identification and authentication control
    5.1 Purpose and SL-C(IAC) descriptions
    5.2 Rationale
    5.3 SR 1.1 \u2013 Human user identification and authentication
    5.3.1 Requirement
    5.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    30<\/td>\n5.3.3 Requirement enhancements
    5.3.4 Security levels <\/td>\n<\/tr>\n
    31<\/td>\n5.4 SR 1.2 \u2013 Software process and device identification and authentication
    5.4.1 Requirement
    5.4.2 Rationale and supplemental guidance
    5.4.3 Requirement enhancements <\/td>\n<\/tr>\n
    32<\/td>\n5.4.4 Security levels
    5.5 SR 1.3 \u2013 Account management
    5.5.1 Requirement
    5.5.2 Rationale and supplemental guidance
    5.5.3 Requirement enhancements
    5.5.4 Security levels <\/td>\n<\/tr>\n
    33<\/td>\n5.6 SR 1.4 \u2013 Identifier management
    5.6.1 Requirement
    5.6.2 Rationale and supplemental guidance
    5.6.3 Requirement enhancements
    5.6.4 Security levels
    5.7 SR 1.5 \u2013 Authenticator management
    5.7.1 Requirement
    5.7.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    34<\/td>\n5.7.3 Requirement enhancements
    5.7.4 Security levels <\/td>\n<\/tr>\n
    35<\/td>\n5.8 SR 1.6 \u2013 Wireless access management
    5.8.1 Requirement
    5.8.2 Rationale and supplemental guidance
    5.8.3 Requirement enhancements
    5.8.4 Security levels
    5.9 SR 1.7 \u2013 Strength of password-based authentication
    5.9.1 Requirement
    5.9.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    36<\/td>\n5.9.3 Requirement enhancements
    5.9.4 Security levels
    5.10 SR 1.8 \u2013 Public key infrastructure (PKI) certificates
    5.10.1 Requirement
    5.10.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    37<\/td>\n5.10.3 Requirement enhancements
    5.10.4 Security levels
    5.11 SR 1.9 \u2013 Strength of public key authentication
    5.11.1 Requirement
    5.11.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    38<\/td>\n5.11.3 Requirement enhancements
    5.11.4 Security levels
    5.12 SR 1.10 \u2013 Authenticator feedback
    5.12.1 Requirement
    5.12.2 Rationale and supplemental guidance
    5.12.3 Requirement enhancements
    5.12.4 Security levels <\/td>\n<\/tr>\n
    39<\/td>\n5.13 SR 1.11 \u2013 Unsuccessful login attempts
    5.13.1 Requirement
    5.13.2 Rationale and supplemental guidance
    5.13.3 Requirement enhancements
    5.13.4 Security levels
    5.14 SR 1.12 \u2013 System use notification
    5.14.1 Requirement
    5.14.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    40<\/td>\n5.14.3 Requirement enhancements
    5.14.4 Security levels
    5.15 SR 1.13 \u2013 Access via untrusted networks
    5.15.1 Requirement
    5.15.2 Rationale and supplemental guidance
    5.15.3 Requirement enhancements
    5.15.4 Security levels <\/td>\n<\/tr>\n
    41<\/td>\n6 FR 2 \u2013 Use control
    6.1 Purpose and SL-C(UC) descriptions
    6.2 Rationale
    6.3 SR 2.1 \u2013 Authorization enforcement
    6.3.1 Requirement
    6.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    42<\/td>\n6.3.3 Requirement enhancements
    6.3.4 Security levels
    6.4 SR 2.2 \u2013 Wireless use control
    6.4.1 Requirement <\/td>\n<\/tr>\n
    43<\/td>\n6.4.2 Rationale and supplemental guidance
    6.4.3 Requirement enhancements
    6.4.4 Security levels
    6.5 SR 2.3 \u2013 Use control for portable and mobile devices
    6.5.1 Requirement
    6.5.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    44<\/td>\n6.5.3 Requirement enhancements
    6.5.4 Security levels
    6.6 SR 2.4 \u2013 Mobile code
    6.6.1 Requirement
    6.6.2 Rationale and supplemental guidance
    6.6.3 Requirement enhancements
    6.6.4 Security levels <\/td>\n<\/tr>\n
    45<\/td>\n6.7 SR 2.5 \u2013 Session lock
    6.7.1 Requirement
    6.7.2 Rationale and supplemental guidance
    6.7.3 Requirement enhancements
    6.7.4 Security levels
    6.8 SR 2.6 \u2013 Remote session termination
    6.8.1 Requirement
    6.8.2 Rationale and supplemental guidance
    6.8.3 Requirement enhancements <\/td>\n<\/tr>\n
    46<\/td>\n6.8.4 Security levels
    6.9 SR 2.7 \u2013 Concurrent session control
    6.9.1 Requirement
    6.9.2 Rationale and supplemental guidance
    6.9.3 Requirement enhancements
    6.9.4 Security levels
    6.10 SR 2.8 \u2013 Auditable events
    6.10.1 Requirement
    6.10.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    47<\/td>\n6.10.3 Requirement enhancements
    6.10.4 Security levels
    6.11 SR 2.9 \u2013 Audit storage capacity
    6.11.1 Requirement
    6.11.2 Rationale and supplemental guidance
    6.11.3 Requirement enhancements <\/td>\n<\/tr>\n
    48<\/td>\n6.11.4 Security levels
    6.12 SR 2.10 \u2013 Response to audit processing failures
    6.12.1 Requirement
    6.12.2 Rationale and supplemental guidance
    6.12.3 Requirement enhancements
    6.12.4 Security levels
    6.13 SR 2.11 \u2013 Timestamps
    6.13.1 Requirement
    6.13.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    49<\/td>\n6.13.3 Requirement enhancements
    6.13.4 Security levels
    6.14 SR 2.12 \u2013 Non-repudiation
    6.14.1 Requirement
    6.14.2 Rationale and supplemental guidance
    6.14.3 Requirement enhancements
    6.14.4 Security levels <\/td>\n<\/tr>\n
    50<\/td>\n7 FR 3 \u2013 System integrity
    7.1 Purpose and SL-C(SI) descriptions
    7.2 Rationale
    7.3 SR 3.1 \u2013 Communication integrity
    7.3.1 Requirement
    7.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    51<\/td>\n7.3.3 Requirement enhancements
    7.3.4 Security levels
    7.4 SR 3.2 \u2013 Malicious code protection
    7.4.1 Requirement
    7.4.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    52<\/td>\n7.4.3 Requirement enhancements
    7.4.4 Security levels
    7.5 SR 3.3 \u2013 Security functionality verification
    7.5.1 Requirement
    7.5.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    53<\/td>\n7.5.3 Requirement enhancements
    7.5.4 Security levels
    7.6 SR 3.4 \u2013 Software and information integrity
    7.6.1 Requirement
    7.6.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    54<\/td>\n7.6.3 Requirement enhancements
    7.6.4 Security levels
    7.7 SR 3.5 \u2013 Input validation
    7.7.1 Requirement
    7.7.2 Rationale and supplemental guidance
    7.7.3 Requirement enhancements
    7.7.4 Security levels <\/td>\n<\/tr>\n
    55<\/td>\n7.8 SR 3.6 \u2013 Deterministic output
    7.8.1 Requirement
    7.8.2 Rationale and supplemental guidance
    7.8.3 Requirement enhancements
    7.8.4 Security levels
    7.9 SR 3.7 \u2013 Error handling
    7.9.1 Requirement
    7.9.2 Rationale and supplemental guidance
    7.9.3 Requirement enhancements <\/td>\n<\/tr>\n
    56<\/td>\n7.9.4 Security levels
    7.10 SR 3.8 \u2013 Session integrity
    7.10.1 Requirement
    7.10.2 Rationale and supplemental guidance
    7.10.3 Requirement enhancements
    7.10.4 Security levels <\/td>\n<\/tr>\n
    57<\/td>\n7.11 SR 3.9 \u2013 Protection of audit information
    7.11.1 Requirement
    7.11.2 Rationale and supplemental guidance
    7.11.3 Requirement enhancements
    7.11.4 Security levels
    8 FR 4 \u2013 Data confidentiality
    8.1 Purpose and SL-C(DC) descriptions
    8.2 Rationale <\/td>\n<\/tr>\n
    58<\/td>\n8.3 SR 4.1 \u2013 Information confidentiality
    8.3.1 Requirement
    8.3.2 Rationale and supplemental guidance
    8.3.3 Requirement enhancements
    8.3.4 Security levels <\/td>\n<\/tr>\n
    59<\/td>\n8.4 SR 4.2 \u2013 Information persistence
    8.4.1 Requirement
    8.4.2 Rationale and supplemental guidance
    8.4.3 Requirement enhancements
    8.4.4 Security levels
    8.5 SR 4.3 \u2013 Use of cryptography
    8.5.1 Requirement <\/td>\n<\/tr>\n
    60<\/td>\n8.5.2 Rationale and supplemental guidance
    8.5.3 Requirement enhancements
    8.5.4 Security levels
    9 FR 5 \u2013 Restricted data flow
    9.1 Purpose and SL-C(RDF) descriptions
    9.2 Rationale <\/td>\n<\/tr>\n
    61<\/td>\n9.3 SR 5.1 \u2013 Network segmentation
    9.3.1 Requirement
    9.3.2 Rationale and supplemental guidance
    9.3.3 Requirement enhancements <\/td>\n<\/tr>\n
    62<\/td>\n9.3.4 Security levels
    9.4 SR 5.2 \u2013 Zone boundary protection
    9.4.1 Requirement
    9.4.2 Rationale and supplemental guidance
    9.4.3 Requirement enhancements <\/td>\n<\/tr>\n
    63<\/td>\n9.4.4 Security levels
    9.5 SR 5.3 \u2013 General purpose person-to-person communication restrictions
    9.5.1 Requirement
    9.5.2 Rationale and supplemental guidance
    9.5.3 Requirement enhancements <\/td>\n<\/tr>\n
    64<\/td>\n9.5.4 Security levels
    9.6 SR 5.4 \u2013 Application partitioning
    9.6.1 Requirement
    9.6.2 Rationale and supplemental guidance
    9.6.3 Requirement enhancements
    9.6.4 Security levels
    10 FR 6 \u2013 Timely response to events
    10.1 Purpose and SL-C(TRE) descriptions <\/td>\n<\/tr>\n
    65<\/td>\n10.2 Rationale
    10.3 SR 6.1 \u2013 Audit log accessibility
    10.3.1 Requirement
    10.3.2 Rationale and supplemental guidance
    10.3.3 Requirement enhancements
    10.3.4 Security levels
    10.4 SR 6.2 \u2013 Continuous monitoring
    10.4.1 Requirement
    10.4.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    66<\/td>\n10.4.3 Requirement enhancements
    10.4.4 Security levels
    11 FR 7 \u2013 Resource availability
    11.1 Purpose and SL-C(RA) descriptions
    11.2 Rationale <\/td>\n<\/tr>\n
    67<\/td>\n11.3 SR 7.1 \u2013 Denial of service protection
    11.3.1 Requirement
    11.3.2 Rationale and supplemental guidance
    11.3.3 Requirement enhancements
    11.3.4 Security levels
    11.4 SR 7.2 \u2013 Resource management
    11.4.1 Requirement
    11.4.2 Rationale and supplemental guidance
    11.4.3 Requirement enhancements <\/td>\n<\/tr>\n
    68<\/td>\n11.4.4 Security levels
    11.5 SR 7.3 \u2013 Control system backup
    11.5.1 Requirement
    11.5.2 Rationale and supplemental guidance
    11.5.3 Requirement enhancements
    11.5.4 Security levels
    11.6 SR 7.4 \u2013 Control system recovery and reconstitution
    11.6.1 Requirement
    11.6.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    69<\/td>\n11.6.3 Requirement enhancements
    11.6.4 Security levels
    11.7 SR 7.5 \u2013 Emergency power
    11.7.1 Requirement
    11.7.2 Rationale and supplemental guidance
    11.7.3 Requirement enhancements
    11.7.4 Security levels
    11.8 SR 7.6 \u2013 Network and security configuration settings
    11.8.1 Requirement
    11.8.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    70<\/td>\n11.8.3 Requirement enhancements
    11.8.4 Security levels
    11.9 SR 7.7 \u2013 Least functionality
    11.9.1 Requirement
    11.9.2 Rationale and supplemental guidance
    11.9.3 Requirement enhancements
    11.9.4 Security levels <\/td>\n<\/tr>\n
    71<\/td>\n11.10 SR 7.8 \u2013 Control system component inventory
    11.10.1 Requirement
    11.10.2 Rationale and supplemental guidance
    11.10.3 Requirement enhancements
    11.10.4 Security levels <\/td>\n<\/tr>\n
    72<\/td>\nAnnex A (informative)Discussion of the SL vector <\/td>\n<\/tr>\n
    74<\/td>\nFigure A.1 \u2013 High-level process-industry example showing zones and conduits <\/td>\n<\/tr>\n
    75<\/td>\nFigure A.2 \u2013 High-level manufacturing example showing zones and conduits <\/td>\n<\/tr>\n
    76<\/td>\nFigure A.3 \u2013 Schematic of correlation of the use of different SL types <\/td>\n<\/tr>\n
    80<\/td>\nAnnex B (informative)Mapping of SRs and REs to FR SL levels 1-4
    Table B.1 \u2013 Mapping of SRs and REs to FR SL levels 1-4 (1 of 4) <\/td>\n<\/tr>\n
    84<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

    Industrial communication networks. Network and system security – System security requirements and security levels<\/b><\/p>\n\n\n\n\n
    Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
    BSI<\/b><\/a><\/td>\n2019<\/td>\n86<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":245284,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[385,2641],"product_tag":[],"class_list":{"0":"post-245277","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-25-040-40","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/245277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/245284"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=245277"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=245277"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=245277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}