{"id":244397,"date":"2024-10-19T16:03:21","date_gmt":"2024-10-19T16:03:21","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-62443-3-22020\/"},"modified":"2024-10-25T11:02:23","modified_gmt":"2024-10-25T11:02:23","slug":"bs-en-iec-62443-3-22020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-62443-3-22020\/","title":{"rendered":"BS EN IEC 62443-3-2:2020"},"content":{"rendered":"

IEC 62443-3-2:2020 establishes requirements for: \u2022 defining a system under consideration (SUC) for an industrial automation and control system (IACS); \u2022 partitioning the SUC into zones and conduits; \u2022 assessing risk for each zone and conduit; \u2022 establishing the target security level (SL-T) for each zone and conduit; and \u2022 documenting the security requirements.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
5<\/td>\nAnnex ZA(normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n
7<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
9<\/td>\nFOREWORD <\/td>\n<\/tr>\n
11<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
12<\/td>\n1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms, acronyms and conventions
3.1 Terms and definitions <\/td>\n<\/tr>\n
15<\/td>\n3.2 Abbreviated terms and acronyms <\/td>\n<\/tr>\n
16<\/td>\n3.3 Conventions
4 Zone, conduit and risk assessment requirements
4.1 Overview <\/td>\n<\/tr>\n
17<\/td>\nFigure 1 \u2013 Workflow diagram outlining the primary steps requiredto establish zones and conduits, as well as to assess risk <\/td>\n<\/tr>\n
18<\/td>\n4.2 ZCR 1: Identify the SUC
4.2.1 ZCR 1.1: Identify the SUC perimeter and access points
4.3 ZCR 2: Initial cyber security risk assessment
4.3.1 ZCR 2.1: Perform initial cyber security risk assessment <\/td>\n<\/tr>\n
19<\/td>\n4.4 ZCR 3: Partition the SUC into zones and conduits
4.4.1 Overview
4.4.2 ZCR 3.1: Establish zones and conduits
4.4.3 ZCR 3.2: Separate business and IACS assets
4.4.4 ZCR 3.3: Separate safety related assets <\/td>\n<\/tr>\n
20<\/td>\n4.4.5 ZCR 3.4: Separate temporarily connected devices
4.4.6 ZCR 3.5: Separate wireless devices
4.4.7 ZCR 3.6: Separate devices connected via external networks <\/td>\n<\/tr>\n
21<\/td>\n4.5 ZCR 4: Risk comparison
4.5.1 Overview
4.5.2 ZCR 4.1: Compare initial risk to tolerable risk
4.6 ZCR 5: Perform a detailed cyber security risk assessment
4.6.1 Overview <\/td>\n<\/tr>\n
22<\/td>\n4.6.2 ZCR 5.1: Identify threats
Figure 2 \u2013 Detailed cyber security risk assessment workflow per zone or conduit <\/td>\n<\/tr>\n
23<\/td>\n4.6.3 ZCR 5.2: Identify vulnerabilities
4.6.4 ZCR 5.3: Determine consequence and impact <\/td>\n<\/tr>\n
24<\/td>\n4.6.5 ZCR 5.4: Determine unmitigated likelihood
4.6.6 ZCR 5.5: Determine unmitigated cyber security risk
4.6.7 ZCR 5.6: Determine SL-T <\/td>\n<\/tr>\n
25<\/td>\n4.6.8 ZCR 5.7: Compare unmitigated risk with tolerable risk
4.6.9 ZCR 5.8: Identify and evaluate existing countermeasures
4.6.10 ZCR 5.9: Reevaluate likelihood and impact <\/td>\n<\/tr>\n
26<\/td>\n4.6.11 ZCR 5.10: Determine residual risk
4.6.12 ZCR 5.11: Compare residual risk with tolerable risk
4.6.13 ZCR 5.12: Identify additional cyber security countermeasures <\/td>\n<\/tr>\n
27<\/td>\n4.6.14 ZCR 5.13: Document and communicate results
4.7 ZCR 6: Document cyber security requirements, assumptions and constraints
4.7.1 Overview
4.7.2 ZCR 6.1: Cyber security requirements specification <\/td>\n<\/tr>\n
28<\/td>\n4.7.3 ZCR 6.2: SUC description
4.7.4 ZCR 6.3: Zone and conduit drawings
4.7.5 ZCR 6.4: Zone and conduit characteristics <\/td>\n<\/tr>\n
29<\/td>\n4.7.6 ZCR 6.5: Operating environment assumptions <\/td>\n<\/tr>\n
30<\/td>\n4.7.7 ZCR 6.6: Threat environment
4.7.8 ZCR 6.7: Organizational security policies
4.7.9 ZCR 6.8: Tolerable risk <\/td>\n<\/tr>\n
31<\/td>\n4.7.10 ZCR 6.9: Regulatory requirements
4.8 ZCR 7: Asset owner approval
4.8.1 Overview
4.8.2 ZCR 7.1: Attain asset owner approval <\/td>\n<\/tr>\n
32<\/td>\nAnnex A (informative)Security levels <\/td>\n<\/tr>\n
33<\/td>\nAnnex B (informative)Risk matrices
Tables
Table B.1 \u2013 Example of a 3 x 5 risk matrix
Table B.2 \u2013 Example of likelihood scale <\/td>\n<\/tr>\n
34<\/td>\nTable B.3 \u2013 Example of consequence or severity scale
Table B.4 \u2013 Example of a simple 3 x 3 risk matrix <\/td>\n<\/tr>\n
35<\/td>\nTable B.5 \u2013 Example of a 5 x 5 risk matrix
Table B.6 \u2013 Example of a 3 x 4 matrix <\/td>\n<\/tr>\n
36<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Security for industrial automation and control systems – Security risk assessment for system design<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2020<\/td>\n38<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":244402,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-244397","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/244397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/244402"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=244397"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=244397"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=244397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}