{"id":513346,"date":"2024-11-05T14:23:34","date_gmt":"2024-11-05T14:23:34","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/can-csa-iec-tr-62443-3-117\/"},"modified":"2024-11-05T14:23:34","modified_gmt":"2024-11-05T14:23:34","slug":"can-csa-iec-tr-62443-3-117","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/csa\/can-csa-iec-tr-62443-3-117\/","title":{"rendered":"CAN\/CSA-IEC\/TR 62443-3-1:17"},"content":{"rendered":"

This is the first edition of CAN\/CSA-IEC\/TR 62443-3-1, Industrial communication networks \u2014 Network and system security \u2014 Part 3-1: Security technologies for industrial automation and control systems, which is an adoption without modification of the identically titled IEC (International Electrotechnical Commission) Technical Report 62443-3-1 (first edition, 2009-07). At the time of publication, IEC\/TR 62443-3-1:2009 is available from IEC in English only. CSA Group will publish the French version when it becomes available from IEC. <\/p>\n

For brevity, this Standard will be referred to as \u201cCAN\/CSA-IEC\/TR 62443-3-1\u201d throughout. <\/p>\n

The IEC Technical Report is one in a series of Standards developed by IEC\/TC 65 on industrial automation networking security that are being adopted by CSA Group. The IEC Technical Report provides an assessment of various cyber security tools, mitigation counter-measures, and technologies that may be effectively applied to modern electronic IACS infrastructures. It is intended to be used by developers of industrial control systems, and those who ensure that the cyber security elements of the system are met. <\/p>\n

This Standard uses terminology and concepts specified in CAN\/CSA-IEC 62443-2-1:17, Industrial communication networks \u2014 Network and system security \u2014 Part 2-1: Establishing an industrial automation and control system security program. <\/p>\n

Scope<\/strong><\/p>\n

This part of IEC 62443 provides a current assessment of various cybersecurity tools, mitigation counter-measures, and technologies that may effectively apply to the modern electronically based IACSs regulating and monitoring numerous industries and critical infrastructures. It describes several categories of control system-centric cybersecurity technologies, the types of products available in those categories, the pros and cons of using those products in the automated IACS environments, relative to the expected threats and known cyber vulnerabilities, and, most important, the preliminary recommendations and guidance for using these cybersecurity technology products and\/or countermeasures. <\/p>\n

The concept of IACS cybersecurity as applied in this technical report is in the broadest possible sense, encompassing all types of components, plants, facilities, and systems in all industries and critical infrastructures. IACSs include, but are not limited to: <\/p>\n