{"id":245277,"date":"2024-10-19T16:07:50","date_gmt":"2024-10-19T16:07:50","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-62443-3-32019\/"},"modified":"2024-10-25T11:07:44","modified_gmt":"2024-10-25T11:07:44","slug":"bs-en-iec-62443-3-32019","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-62443-3-32019\/","title":{"rendered":"BS EN IEC 62443-3-3:2019"},"content":{"rendered":"
This part of the IEC 62443<\/span> <\/span> series provides detailed technical control system requirements (SRs) associated with the seven foundational requirements (FRs) described in IEC 62443\u20111\u20111<\/span> <\/span> including defining the requirements for control system capability security levels, SL-C(control system). These requirements would be used by various members of the industrial automation and control system (IACS) community along with the defined zones and conduits for the system under consideration (SuC) while developing the appropriate control system target SL, SL-T(control system), for a specific asset.<\/p>\n As defined in IEC 62443\u20111\u20111<\/span> <\/span> there are a total of seven FRs:<\/p>\n Identification and authentication control (IAC),<\/p>\n<\/li>\n Use control (UC),<\/p>\n<\/li>\n System integrity (SI),<\/p>\n<\/li>\n Data confidentiality (DC),<\/p>\n<\/li>\n Restricted data flow (RDF),<\/p>\n<\/li>\n Timely response to events (TRE), and<\/p>\n<\/li>\n Resource availability (RA).<\/p>\n<\/li>\n<\/ol>\n These seven requirements are the foundation for control system capability SLs, SL-C (control system). Defining security capability at the control system level is the goal and objective of this standard as opposed to target SLs, SL-T, or achieved SLs, SL-A, which are out of scope.<\/p>\n See IEC 62443\u20112\u20111<\/span> <\/span> for an equivalent set of non-technical, program-related, capability SRs necessary for fully achieving a control system target SL.<\/p>\n Industrial communication networks. Network and system security – System security requirements and security levels<\/b><\/p>\n\n
PDF Catalog<\/h4>\n
\n
\n PDF Pages<\/th>\n PDF Title<\/th>\n<\/tr>\n \n 2<\/td>\n undefined <\/td>\n<\/tr>\n \n 5<\/td>\n Annex ZA(normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n \n 7<\/td>\n CONTENTS <\/td>\n<\/tr>\n \n 14<\/td>\n FOREWORD <\/td>\n<\/tr>\n \n 16<\/td>\n 0 Introduction
0.1 Overview <\/td>\n<\/tr>\n\n 17<\/td>\n 0.2 Purpose and intended audience
0.3 Usage within other parts of the IEC 62443 series <\/td>\n<\/tr>\n\n 18<\/td>\n Figures
Figure 1 \u2013 Structure of the IEC 62443 series <\/td>\n<\/tr>\n\n 19<\/td>\n 1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms, acronyms, and conventions
3.1 Terms and definitions <\/td>\n<\/tr>\n\n 25<\/td>\n 3.2 Abbreviated terms and acronyms <\/td>\n<\/tr>\n \n 27<\/td>\n 3.3 Conventions
4 Common control system security constraints
4.1 Overview <\/td>\n<\/tr>\n\n 28<\/td>\n 4.2 Support of essential functions
4.3 Compensating countermeasures <\/td>\n<\/tr>\n\n 29<\/td>\n 4.4 Least privilege
5 FR 1 \u2013 Identification and authentication control
5.1 Purpose and SL-C(IAC) descriptions
5.2 Rationale
5.3 SR 1.1 \u2013 Human user identification and authentication
5.3.1 Requirement
5.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 30<\/td>\n 5.3.3 Requirement enhancements
5.3.4 Security levels <\/td>\n<\/tr>\n\n 31<\/td>\n 5.4 SR 1.2 \u2013 Software process and device identification and authentication
5.4.1 Requirement
5.4.2 Rationale and supplemental guidance
5.4.3 Requirement enhancements <\/td>\n<\/tr>\n\n 32<\/td>\n 5.4.4 Security levels
5.5 SR 1.3 \u2013 Account management
5.5.1 Requirement
5.5.2 Rationale and supplemental guidance
5.5.3 Requirement enhancements
5.5.4 Security levels <\/td>\n<\/tr>\n\n 33<\/td>\n 5.6 SR 1.4 \u2013 Identifier management
5.6.1 Requirement
5.6.2 Rationale and supplemental guidance
5.6.3 Requirement enhancements
5.6.4 Security levels
5.7 SR 1.5 \u2013 Authenticator management
5.7.1 Requirement
5.7.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 34<\/td>\n 5.7.3 Requirement enhancements
5.7.4 Security levels <\/td>\n<\/tr>\n\n 35<\/td>\n 5.8 SR 1.6 \u2013 Wireless access management
5.8.1 Requirement
5.8.2 Rationale and supplemental guidance
5.8.3 Requirement enhancements
5.8.4 Security levels
5.9 SR 1.7 \u2013 Strength of password-based authentication
5.9.1 Requirement
5.9.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 36<\/td>\n 5.9.3 Requirement enhancements
5.9.4 Security levels
5.10 SR 1.8 \u2013 Public key infrastructure (PKI) certificates
5.10.1 Requirement
5.10.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 37<\/td>\n 5.10.3 Requirement enhancements
5.10.4 Security levels
5.11 SR 1.9 \u2013 Strength of public key authentication
5.11.1 Requirement
5.11.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 38<\/td>\n 5.11.3 Requirement enhancements
5.11.4 Security levels
5.12 SR 1.10 \u2013 Authenticator feedback
5.12.1 Requirement
5.12.2 Rationale and supplemental guidance
5.12.3 Requirement enhancements
5.12.4 Security levels <\/td>\n<\/tr>\n\n 39<\/td>\n 5.13 SR 1.11 \u2013 Unsuccessful login attempts
5.13.1 Requirement
5.13.2 Rationale and supplemental guidance
5.13.3 Requirement enhancements
5.13.4 Security levels
5.14 SR 1.12 \u2013 System use notification
5.14.1 Requirement
5.14.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 40<\/td>\n 5.14.3 Requirement enhancements
5.14.4 Security levels
5.15 SR 1.13 \u2013 Access via untrusted networks
5.15.1 Requirement
5.15.2 Rationale and supplemental guidance
5.15.3 Requirement enhancements
5.15.4 Security levels <\/td>\n<\/tr>\n\n 41<\/td>\n 6 FR 2 \u2013 Use control
6.1 Purpose and SL-C(UC) descriptions
6.2 Rationale
6.3 SR 2.1 \u2013 Authorization enforcement
6.3.1 Requirement
6.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 42<\/td>\n 6.3.3 Requirement enhancements
6.3.4 Security levels
6.4 SR 2.2 \u2013 Wireless use control
6.4.1 Requirement <\/td>\n<\/tr>\n\n 43<\/td>\n 6.4.2 Rationale and supplemental guidance
6.4.3 Requirement enhancements
6.4.4 Security levels
6.5 SR 2.3 \u2013 Use control for portable and mobile devices
6.5.1 Requirement
6.5.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 44<\/td>\n 6.5.3 Requirement enhancements
6.5.4 Security levels
6.6 SR 2.4 \u2013 Mobile code
6.6.1 Requirement
6.6.2 Rationale and supplemental guidance
6.6.3 Requirement enhancements
6.6.4 Security levels <\/td>\n<\/tr>\n\n 45<\/td>\n 6.7 SR 2.5 \u2013 Session lock
6.7.1 Requirement
6.7.2 Rationale and supplemental guidance
6.7.3 Requirement enhancements
6.7.4 Security levels
6.8 SR 2.6 \u2013 Remote session termination
6.8.1 Requirement
6.8.2 Rationale and supplemental guidance
6.8.3 Requirement enhancements <\/td>\n<\/tr>\n\n 46<\/td>\n 6.8.4 Security levels
6.9 SR 2.7 \u2013 Concurrent session control
6.9.1 Requirement
6.9.2 Rationale and supplemental guidance
6.9.3 Requirement enhancements
6.9.4 Security levels
6.10 SR 2.8 \u2013 Auditable events
6.10.1 Requirement
6.10.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 47<\/td>\n 6.10.3 Requirement enhancements
6.10.4 Security levels
6.11 SR 2.9 \u2013 Audit storage capacity
6.11.1 Requirement
6.11.2 Rationale and supplemental guidance
6.11.3 Requirement enhancements <\/td>\n<\/tr>\n\n 48<\/td>\n 6.11.4 Security levels
6.12 SR 2.10 \u2013 Response to audit processing failures
6.12.1 Requirement
6.12.2 Rationale and supplemental guidance
6.12.3 Requirement enhancements
6.12.4 Security levels
6.13 SR 2.11 \u2013 Timestamps
6.13.1 Requirement
6.13.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 49<\/td>\n 6.13.3 Requirement enhancements
6.13.4 Security levels
6.14 SR 2.12 \u2013 Non-repudiation
6.14.1 Requirement
6.14.2 Rationale and supplemental guidance
6.14.3 Requirement enhancements
6.14.4 Security levels <\/td>\n<\/tr>\n\n 50<\/td>\n 7 FR 3 \u2013 System integrity
7.1 Purpose and SL-C(SI) descriptions
7.2 Rationale
7.3 SR 3.1 \u2013 Communication integrity
7.3.1 Requirement
7.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 51<\/td>\n 7.3.3 Requirement enhancements
7.3.4 Security levels
7.4 SR 3.2 \u2013 Malicious code protection
7.4.1 Requirement
7.4.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 52<\/td>\n 7.4.3 Requirement enhancements
7.4.4 Security levels
7.5 SR 3.3 \u2013 Security functionality verification
7.5.1 Requirement
7.5.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 53<\/td>\n 7.5.3 Requirement enhancements
7.5.4 Security levels
7.6 SR 3.4 \u2013 Software and information integrity
7.6.1 Requirement
7.6.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 54<\/td>\n 7.6.3 Requirement enhancements
7.6.4 Security levels
7.7 SR 3.5 \u2013 Input validation
7.7.1 Requirement
7.7.2 Rationale and supplemental guidance
7.7.3 Requirement enhancements
7.7.4 Security levels <\/td>\n<\/tr>\n\n 55<\/td>\n 7.8 SR 3.6 \u2013 Deterministic output
7.8.1 Requirement
7.8.2 Rationale and supplemental guidance
7.8.3 Requirement enhancements
7.8.4 Security levels
7.9 SR 3.7 \u2013 Error handling
7.9.1 Requirement
7.9.2 Rationale and supplemental guidance
7.9.3 Requirement enhancements <\/td>\n<\/tr>\n\n 56<\/td>\n 7.9.4 Security levels
7.10 SR 3.8 \u2013 Session integrity
7.10.1 Requirement
7.10.2 Rationale and supplemental guidance
7.10.3 Requirement enhancements
7.10.4 Security levels <\/td>\n<\/tr>\n\n 57<\/td>\n 7.11 SR 3.9 \u2013 Protection of audit information
7.11.1 Requirement
7.11.2 Rationale and supplemental guidance
7.11.3 Requirement enhancements
7.11.4 Security levels
8 FR 4 \u2013 Data confidentiality
8.1 Purpose and SL-C(DC) descriptions
8.2 Rationale <\/td>\n<\/tr>\n\n 58<\/td>\n 8.3 SR 4.1 \u2013 Information confidentiality
8.3.1 Requirement
8.3.2 Rationale and supplemental guidance
8.3.3 Requirement enhancements
8.3.4 Security levels <\/td>\n<\/tr>\n\n 59<\/td>\n 8.4 SR 4.2 \u2013 Information persistence
8.4.1 Requirement
8.4.2 Rationale and supplemental guidance
8.4.3 Requirement enhancements
8.4.4 Security levels
8.5 SR 4.3 \u2013 Use of cryptography
8.5.1 Requirement <\/td>\n<\/tr>\n\n 60<\/td>\n 8.5.2 Rationale and supplemental guidance
8.5.3 Requirement enhancements
8.5.4 Security levels
9 FR 5 \u2013 Restricted data flow
9.1 Purpose and SL-C(RDF) descriptions
9.2 Rationale <\/td>\n<\/tr>\n\n 61<\/td>\n 9.3 SR 5.1 \u2013 Network segmentation
9.3.1 Requirement
9.3.2 Rationale and supplemental guidance
9.3.3 Requirement enhancements <\/td>\n<\/tr>\n\n 62<\/td>\n 9.3.4 Security levels
9.4 SR 5.2 \u2013 Zone boundary protection
9.4.1 Requirement
9.4.2 Rationale and supplemental guidance
9.4.3 Requirement enhancements <\/td>\n<\/tr>\n\n 63<\/td>\n 9.4.4 Security levels
9.5 SR 5.3 \u2013 General purpose person-to-person communication restrictions
9.5.1 Requirement
9.5.2 Rationale and supplemental guidance
9.5.3 Requirement enhancements <\/td>\n<\/tr>\n\n 64<\/td>\n 9.5.4 Security levels
9.6 SR 5.4 \u2013 Application partitioning
9.6.1 Requirement
9.6.2 Rationale and supplemental guidance
9.6.3 Requirement enhancements
9.6.4 Security levels
10 FR 6 \u2013 Timely response to events
10.1 Purpose and SL-C(TRE) descriptions <\/td>\n<\/tr>\n\n 65<\/td>\n 10.2 Rationale
10.3 SR 6.1 \u2013 Audit log accessibility
10.3.1 Requirement
10.3.2 Rationale and supplemental guidance
10.3.3 Requirement enhancements
10.3.4 Security levels
10.4 SR 6.2 \u2013 Continuous monitoring
10.4.1 Requirement
10.4.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 66<\/td>\n 10.4.3 Requirement enhancements
10.4.4 Security levels
11 FR 7 \u2013 Resource availability
11.1 Purpose and SL-C(RA) descriptions
11.2 Rationale <\/td>\n<\/tr>\n\n 67<\/td>\n 11.3 SR 7.1 \u2013 Denial of service protection
11.3.1 Requirement
11.3.2 Rationale and supplemental guidance
11.3.3 Requirement enhancements
11.3.4 Security levels
11.4 SR 7.2 \u2013 Resource management
11.4.1 Requirement
11.4.2 Rationale and supplemental guidance
11.4.3 Requirement enhancements <\/td>\n<\/tr>\n\n 68<\/td>\n 11.4.4 Security levels
11.5 SR 7.3 \u2013 Control system backup
11.5.1 Requirement
11.5.2 Rationale and supplemental guidance
11.5.3 Requirement enhancements
11.5.4 Security levels
11.6 SR 7.4 \u2013 Control system recovery and reconstitution
11.6.1 Requirement
11.6.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 69<\/td>\n 11.6.3 Requirement enhancements
11.6.4 Security levels
11.7 SR 7.5 \u2013 Emergency power
11.7.1 Requirement
11.7.2 Rationale and supplemental guidance
11.7.3 Requirement enhancements
11.7.4 Security levels
11.8 SR 7.6 \u2013 Network and security configuration settings
11.8.1 Requirement
11.8.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 70<\/td>\n 11.8.3 Requirement enhancements
11.8.4 Security levels
11.9 SR 7.7 \u2013 Least functionality
11.9.1 Requirement
11.9.2 Rationale and supplemental guidance
11.9.3 Requirement enhancements
11.9.4 Security levels <\/td>\n<\/tr>\n\n 71<\/td>\n 11.10 SR 7.8 \u2013 Control system component inventory
11.10.1 Requirement
11.10.2 Rationale and supplemental guidance
11.10.3 Requirement enhancements
11.10.4 Security levels <\/td>\n<\/tr>\n\n 72<\/td>\n Annex A (informative)Discussion of the SL vector <\/td>\n<\/tr>\n \n 74<\/td>\n Figure A.1 \u2013 High-level process-industry example showing zones and conduits <\/td>\n<\/tr>\n \n 75<\/td>\n Figure A.2 \u2013 High-level manufacturing example showing zones and conduits <\/td>\n<\/tr>\n \n 76<\/td>\n Figure A.3 \u2013 Schematic of correlation of the use of different SL types <\/td>\n<\/tr>\n \n 80<\/td>\n Annex B (informative)Mapping of SRs and REs to FR SL levels 1-4
Table B.1 \u2013 Mapping of SRs and REs to FR SL levels 1-4 (1 of 4) <\/td>\n<\/tr>\n\n 84<\/td>\n Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" \n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n BSI<\/b><\/a><\/td>\n 2019<\/td>\n 86<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":245284,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[385,2641],"product_tag":[],"class_list":{"0":"post-245277","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-25-040-40","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/245277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/245284"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=245277"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=245277"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=245277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}