{"id":244397,"date":"2024-10-19T16:03:21","date_gmt":"2024-10-19T16:03:21","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-62443-3-22020\/"},"modified":"2024-10-25T11:02:23","modified_gmt":"2024-10-25T11:02:23","slug":"bs-en-iec-62443-3-22020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-62443-3-22020\/","title":{"rendered":"BS EN IEC 62443-3-2:2020"},"content":{"rendered":"
IEC 62443-3-2:2020 establishes requirements for: \u2022 defining a system under consideration (SUC) for an industrial automation and control system (IACS); \u2022 partitioning the SUC into zones and conduits; \u2022 assessing risk for each zone and conduit; \u2022 establishing the target security level (SL-T) for each zone and conduit; and \u2022 documenting the security requirements.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Annex ZA(normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | English CONTENTS <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions, abbreviated terms, acronyms and conventions 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3.2 Abbreviated terms and acronyms <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 3.3 Conventions 4 Zone, conduit and risk assessment requirements 4.1 Overview <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Figure 1 \u2013 Workflow diagram outlining the primary steps requiredto establish zones and conduits, as well as to assess risk <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4.2 ZCR 1: Identify the SUC 4.2.1 ZCR 1.1: Identify the SUC perimeter and access points 4.3 ZCR 2: Initial cyber security risk assessment 4.3.1 ZCR 2.1: Perform initial cyber security risk assessment <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4.4 ZCR 3: Partition the SUC into zones and conduits 4.4.1 Overview 4.4.2 ZCR 3.1: Establish zones and conduits 4.4.3 ZCR 3.2: Separate business and IACS assets 4.4.4 ZCR 3.3: Separate safety related assets <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4.4.5 ZCR 3.4: Separate temporarily connected devices 4.4.6 ZCR 3.5: Separate wireless devices 4.4.7 ZCR 3.6: Separate devices connected via external networks <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.5 ZCR 4: Risk comparison 4.5.1 Overview 4.5.2 ZCR 4.1: Compare initial risk to tolerable risk 4.6 ZCR 5: Perform a detailed cyber security risk assessment 4.6.1 Overview <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4.6.2 ZCR 5.1: Identify threats Figure 2 \u2013 Detailed cyber security risk assessment workflow per zone or conduit <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 4.6.3 ZCR 5.2: Identify vulnerabilities 4.6.4 ZCR 5.3: Determine consequence and impact <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 4.6.5 ZCR 5.4: Determine unmitigated likelihood 4.6.6 ZCR 5.5: Determine unmitigated cyber security risk 4.6.7 ZCR 5.6: Determine SL-T <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 4.6.8 ZCR 5.7: Compare unmitigated risk with tolerable risk 4.6.9 ZCR 5.8: Identify and evaluate existing countermeasures 4.6.10 ZCR 5.9: Reevaluate likelihood and impact <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 4.6.11 ZCR 5.10: Determine residual risk 4.6.12 ZCR 5.11: Compare residual risk with tolerable risk 4.6.13 ZCR 5.12: Identify additional cyber security countermeasures <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 4.6.14 ZCR 5.13: Document and communicate results 4.7 ZCR 6: Document cyber security requirements, assumptions and constraints 4.7.1 Overview 4.7.2 ZCR 6.1: Cyber security requirements specification <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 4.7.3 ZCR 6.2: SUC description 4.7.4 ZCR 6.3: Zone and conduit drawings 4.7.5 ZCR 6.4: Zone and conduit characteristics <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 4.7.6 ZCR 6.5: Operating environment assumptions <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 4.7.7 ZCR 6.6: Threat environment 4.7.8 ZCR 6.7: Organizational security policies 4.7.9 ZCR 6.8: Tolerable risk <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 4.7.10 ZCR 6.9: Regulatory requirements 4.8 ZCR 7: Asset owner approval 4.8.1 Overview 4.8.2 ZCR 7.1: Attain asset owner approval <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Annex A (informative)Security levels <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex B (informative)Risk matrices Tables Table B.1 \u2013 Example of a 3 x 5 risk matrix Table B.2 \u2013 Example of likelihood scale <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Table B.3 \u2013 Example of consequence or severity scale Table B.4 \u2013 Example of a simple 3 x 3 risk matrix <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Table B.5 \u2013 Example of a 5 x 5 risk matrix Table B.6 \u2013 Example of a 3 x 4 matrix <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Security for industrial automation and control systems – Security risk assessment for system design<\/b><\/p>\n |