Shopping Cart

No products in the cart.

BS EN IEC 62443-3-2:2020

$167.15

Security for industrial automation and control systems – Security risk assessment for system design

Published By Publication Date Number of Pages
BSI 2020 38
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

IEC 62443-3-2:2020 establishes requirements for: • defining a system under consideration (SUC) for an industrial automation and control system (IACS); • partitioning the SUC into zones and conduits; • assessing risk for each zone and conduit; • establishing the target security level (SL-T) for each zone and conduit; and • documenting the security requirements.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 Annex ZA(normative)Normative references to international publicationswith their corresponding European publications
7 English
CONTENTS
9 FOREWORD
11 INTRODUCTION
12 1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms, acronyms and conventions
3.1 Terms and definitions
15 3.2 Abbreviated terms and acronyms
16 3.3 Conventions
4 Zone, conduit and risk assessment requirements
4.1 Overview
17 Figure 1 – Workflow diagram outlining the primary steps requiredto establish zones and conduits, as well as to assess risk
18 4.2 ZCR 1: Identify the SUC
4.2.1 ZCR 1.1: Identify the SUC perimeter and access points
4.3 ZCR 2: Initial cyber security risk assessment
4.3.1 ZCR 2.1: Perform initial cyber security risk assessment
19 4.4 ZCR 3: Partition the SUC into zones and conduits
4.4.1 Overview
4.4.2 ZCR 3.1: Establish zones and conduits
4.4.3 ZCR 3.2: Separate business and IACS assets
4.4.4 ZCR 3.3: Separate safety related assets
20 4.4.5 ZCR 3.4: Separate temporarily connected devices
4.4.6 ZCR 3.5: Separate wireless devices
4.4.7 ZCR 3.6: Separate devices connected via external networks
21 4.5 ZCR 4: Risk comparison
4.5.1 Overview
4.5.2 ZCR 4.1: Compare initial risk to tolerable risk
4.6 ZCR 5: Perform a detailed cyber security risk assessment
4.6.1 Overview
22 4.6.2 ZCR 5.1: Identify threats
Figure 2 – Detailed cyber security risk assessment workflow per zone or conduit
23 4.6.3 ZCR 5.2: Identify vulnerabilities
4.6.4 ZCR 5.3: Determine consequence and impact
24 4.6.5 ZCR 5.4: Determine unmitigated likelihood
4.6.6 ZCR 5.5: Determine unmitigated cyber security risk
4.6.7 ZCR 5.6: Determine SL-T
25 4.6.8 ZCR 5.7: Compare unmitigated risk with tolerable risk
4.6.9 ZCR 5.8: Identify and evaluate existing countermeasures
4.6.10 ZCR 5.9: Reevaluate likelihood and impact
26 4.6.11 ZCR 5.10: Determine residual risk
4.6.12 ZCR 5.11: Compare residual risk with tolerable risk
4.6.13 ZCR 5.12: Identify additional cyber security countermeasures
27 4.6.14 ZCR 5.13: Document and communicate results
4.7 ZCR 6: Document cyber security requirements, assumptions and constraints
4.7.1 Overview
4.7.2 ZCR 6.1: Cyber security requirements specification
28 4.7.3 ZCR 6.2: SUC description
4.7.4 ZCR 6.3: Zone and conduit drawings
4.7.5 ZCR 6.4: Zone and conduit characteristics
29 4.7.6 ZCR 6.5: Operating environment assumptions
30 4.7.7 ZCR 6.6: Threat environment
4.7.8 ZCR 6.7: Organizational security policies
4.7.9 ZCR 6.8: Tolerable risk
31 4.7.10 ZCR 6.9: Regulatory requirements
4.8 ZCR 7: Asset owner approval
4.8.1 Overview
4.8.2 ZCR 7.1: Attain asset owner approval
32 Annex A (informative)Security levels
33 Annex B (informative)Risk matrices
Tables
Table B.1 – Example of a 3 x 5 risk matrix
Table B.2 – Example of likelihood scale
34 Table B.3 – Example of consequence or severity scale
Table B.4 – Example of a simple 3 x 3 risk matrix
35 Table B.5 – Example of a 5 x 5 risk matrix
Table B.6 – Example of a 3 x 4 matrix
36 Bibliography
BS EN IEC 62443-3-2:2020
$167.15