Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers

This part of IEC 62443 specifies a comprehensive set of requirements for security capabilities for IACS service providers that they can offer to the asset owner during integration and maintenance activities of an Automation Solution. Because not all requirements apply to all industry groups and organizations, Subclause 4.1.4 provides for the development of Profiles that allow for the subsetting of these requirements. Profiles are used to adapt this document to specific environments, including environments not based on an IACS. NOTE 1 The term “Automation Solution” is used as a proper noun (and therefore capitalized) in this part of IEC 62443 to prevent confusion with other uses of this term. Collectively, the security capabilities offered by an IACS service provider are referred to as its Security Program. In a related specification, IEC 62443-2-1 describes requirements for the Security Management System of the asset owner. NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related. Figure 2 illustrates how the integration and maintenance capabilities relate to the IACS and the control system product that is integrated into the Automation Solution. Some of these capabilities reference security measures defined in IEC 62443-3-3 that the service provider must ensure are supported in the Automation Solution (either included in the control system product or separately added to the Automation Solution).

IT-Sicherheit für industrielle Automatisierungssysteme - Teil 2-4: Anforderungen an das IT-Sicherheitsprogramm von Dienstleistern für industrielle Automatisierungssysteme

Sécurité des automatismes industriels et des systèmes de commande - Partie 2-4: Exigences de programme de sécurité pour les fournisseurs de service IACS

L'IEC 62443-2-4:2015 spécifie les exigences de capacités de sécurité pour les fournisseurs de service IACS qu'ils peuvent proposer au propriétaire d'actif pendant les activités d'intégration et de maintenance d'une Solution d'Automatisation. Le contenu du corrigendum d'août 2015 a été pris en considération dans cet exemplaire.

Zaščita industrijske avtomatizacije in nadzornih sistemov - 2-4. del: Zahteve za program varnosti zaščite za ponudnike storitev IACS (IEC 62443-2-4:2015)

Ta del standarda IEC 62443 določa izčrpen sklop zahtev za zmogljivosti zaščite
za ponudnike storitev IACS, ki jih lahko ponudijo lastniku dobrine med integracijo in
vzdrževanjem Rešitve avtomatizacije. Ker vse zahteve ne veljajo za vse
industrijske skupine in organizacije, podtočka 4.1.4 zagotavlja razvoj profilov, ki
omogočajo podnabor teh zahtev. Profili se uporabljajo za prilagoditev tega dokumenta
posebnim okoljem, vključno z okolji, ki ne temeljijo na skupnosti IACS.
OPOMBA 1: Izraz »Rešitev avtomatizacije« se v tem delu standarda IEC 62443 uporablja kot lastno ime (in je zato zapisan z veliko začetnico), da ga ni mogoče zamenjati z drugimi uporabami tega izraza.
Skupaj se zmogljivosti zaščite, ki jih ponuja ponudnik storitev IACS, imenujejo njegov
program varnosti zaščite. V povezani specifikaciji standard IEC 62443-2-1 opisuje zahteve za
sistem vodenja zaščite lastnika dobrine.
OPOMBA 2: Na splošno so te zmogljivosti zaščite povezane s politiko, postopki, prakso in osebjem.
Na sliki 2 je prikazano, kako so zmogljivosti integracije in vzdrževanja povezane s skupnostjo IACS in
izdelkom nadzornega sistema, ki je integriran v Rešitev avtomatizacije. Nekatere od teh
zmogljivosti se navezujejo na ukrepe za zaščito iz standarda IEC 62443-3-3, za katere mora ponudnik storitev
zagotoviti, da jih Rešitev avtomatizacije podpira (so vključeni v izdelku nadzornega
sistema ali pa so v Rešitev avtomatizacije dodani posebej).

General Information

Status
Published
Publication Date
18-Apr-2019
Withdrawal Date
02-Apr-2022
Current Stage
6060 - Document made available - Publishing
Start Date
19-Apr-2019
Due Date
08-Nov-2020
Completion Date
19-Apr-2019

Relations

Effective Date
10-Nov-2020
Effective Date
17-Apr-2018

Overview

EN IEC 62443-2-4:2019 (CLC / CENELEC adoption of IEC 62443-2-4:2015) defines a comprehensive set of security program requirements for IACS service providers - organisations that integrate, deploy or maintain Industrial Automation and Control Systems (IACS). The standard specifies the security capabilities that a service provider should offer to an asset owner during the lifecycle of an Automation Solution, and provides a mechanism (Profiles) to tailor requirements to specific industries or environments.

  • Scope: security capabilities for integration and maintenance activities of Automation Solutions.
  • Audience: IACS service providers, asset owners, procurement teams, security managers, and integrators.
  • Includes a normative Annex (Table A.1) listing security program requirements; an Excel spreadsheet of this table is provided as a supplement.

Key Topics

  • Security Program Requirements: policy, procedure, practice and personnel-related capabilities that collectively form a service provider’s Security Program.
  • Integration and Maintenance Capabilities: controls and processes to be applied during design, deployment, commissioning and ongoing maintenance of control systems.
  • Profiles for Adaptation: Subclause 4.1.4 allows creation of Profiles to subset requirements for different industry groups or non-IACS environments.
  • Maturity Model: a maturity approach is included to help assess and evolve service provider capabilities over time.
  • Interoperability with Product Requirements: references to technical security measures in IEC 62443-3-3 that service providers must ensure are supported in the Automation Solution (either in control system products or added separately).
  • Contract & Negotiation Use: guidance for how asset owners and service providers can use the standard during procurement and contractual negotiations.

Applications

EN IEC 62443-2-4:2019 is practical for:

  • Defining the security capabilities an integration or maintenance service provider will deliver as part of an Automation Solution.
  • Specifying security requirements in contracts, statements of work and service-level agreements (SLAs).
  • Assessing supplier maturity and comparing service providers on consistent security program criteria.
  • Aligning organizational processes with the IEC 62443 series for industrial cybersecurity governance.

Who uses it:

  • Systems integrators, maintenance contractors and managed service providers working on IACS.
  • Asset owners and operators procuring integration or maintenance services.
  • Cybersecurity architects and compliance teams implementing IACS security programs.

Related Standards

  • IEC/EN IEC 62443‑1‑1, 62443‑2‑1, 62443‑3‑3, 62443‑4‑1/4‑2 - other parts of the IEC 62443 series referenced for terminology, owner Security Management Systems and technical security requirements.
  • Use EN IEC 62443-2-4 together with IEC 62443-2-1 (asset owner SMS) and IEC 62443-3-3 (technical security measures) to cover contractual, organizational and technical aspects of IACS security.

Keywords: EN IEC 62443-2-4:2019, IACS service providers, security program, industrial automation, Automation Solution, IEC 62443.

Standard

EN IEC 62443-2-4:2019 - POZOR ! DEl IEC standarda je Excel datoteka "iec62443-2-4{ed1.0}b-Calculation sheet". BARVE

English language
89 pages
Preview
Preview
e-Library read for
1 day
Standard

EN IEC 62443-2-4:2019 - POZOR ! DEl IEC standarda je Excel datoteka "iec62443-2-4{ed1.0}b-Calculation sheet". Dodati na DC-romu! BARVE v IEC standardu! Vodni pretisk na sredini strani na PDF-str: od str 26 do 89

English language
89 pages
Preview
Preview
e-Library read for
1 day

Frequently Asked Questions

EN IEC 62443-2-4:2019 is a standard published by CLC. Its full title is "Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers". This standard covers: This part of IEC 62443 specifies a comprehensive set of requirements for security capabilities for IACS service providers that they can offer to the asset owner during integration and maintenance activities of an Automation Solution. Because not all requirements apply to all industry groups and organizations, Subclause 4.1.4 provides for the development of Profiles that allow for the subsetting of these requirements. Profiles are used to adapt this document to specific environments, including environments not based on an IACS. NOTE 1 The term “Automation Solution” is used as a proper noun (and therefore capitalized) in this part of IEC 62443 to prevent confusion with other uses of this term. Collectively, the security capabilities offered by an IACS service provider are referred to as its Security Program. In a related specification, IEC 62443-2-1 describes requirements for the Security Management System of the asset owner. NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related. Figure 2 illustrates how the integration and maintenance capabilities relate to the IACS and the control system product that is integrated into the Automation Solution. Some of these capabilities reference security measures defined in IEC 62443-3-3 that the service provider must ensure are supported in the Automation Solution (either included in the control system product or separately added to the Automation Solution).

This part of IEC 62443 specifies a comprehensive set of requirements for security capabilities for IACS service providers that they can offer to the asset owner during integration and maintenance activities of an Automation Solution. Because not all requirements apply to all industry groups and organizations, Subclause 4.1.4 provides for the development of Profiles that allow for the subsetting of these requirements. Profiles are used to adapt this document to specific environments, including environments not based on an IACS. NOTE 1 The term “Automation Solution” is used as a proper noun (and therefore capitalized) in this part of IEC 62443 to prevent confusion with other uses of this term. Collectively, the security capabilities offered by an IACS service provider are referred to as its Security Program. In a related specification, IEC 62443-2-1 describes requirements for the Security Management System of the asset owner. NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related. Figure 2 illustrates how the integration and maintenance capabilities relate to the IACS and the control system product that is integrated into the Automation Solution. Some of these capabilities reference security measures defined in IEC 62443-3-3 that the service provider must ensure are supported in the Automation Solution (either included in the control system product or separately added to the Automation Solution).

EN IEC 62443-2-4:2019 is classified under the following ICS (International Classification for Standards) categories: 25.040.40 - Industrial process measurement and control; 35.100.05 - Multilayer applications. The ICS classification helps identify the subject area and facilitates finding related standards.

EN IEC 62443-2-4:2019 has the following relationships with other standards: It is inter standard links to EN IEC 62443-2-4:2024, EN IEC 62443-2-4:2019/A1:2019. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

You can purchase EN IEC 62443-2-4:2019 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of CLC standards.

Standards Content (Sample)


SLOVENSKI STANDARD
01-november-2019
Zaščita industrijske avtomatizacije in nadzornih sistemov - 2-4. del: Zahteve za
program varnosti zaščite za ponudnike storitev IACS (IEC 62443-2-4:2015)
Security for industrial automation and control systems - Part 2-4: Security program
requirements for IACS service providers (IEC 62443-2-4:2015)
IT-Sicherheit für industrielle Automatisierungssysteme - Teil 2-4: Anforderungen an das
IT-Sicherheitsprogramm von Dienstleistern für industrielle Automatisierungssysteme (IEC
62443-2-4:2015)
Sécurité des automatismes industriels et des systèmes de commande Partie 2-4:
Exigences de programme de sécurité pour les fournisseurs de service IACS (IEC 62443-
2-4:2015)
Ta slovenski standard je istoveten z: EN IEC 62443-2-4:2019
ICS:
25.040.01 Sistemi za avtomatizacijo v Industrial automation
industriji na splošno systems in general
35.030 Informacijska varnost IT Security
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD EN IEC 62443-2-4

NORME EUROPÉENNE
EUROPÄISCHE NORM
April 2019
ICS 25.040.40; 35.100.05
English Version
Security for industrial automation and control systems - Part 2-4:
Security program requirements for IACS service providers
(IEC 62443-2-4:2015)
Sécurité des automatismes industriels et des systèmes de IT-Sicherheit für industrielle Automatisierungssysteme - Teil
commande - Partie 2-4: Exigences de programme de 2-4: Anforderungen an das IT-Sicherheitsprogramm von
sécurité pour les fournisseurs de service IACS Dienstleistern für industrielle Automatisierungssysteme
(IEC 62443-2-4:2015) (IEC 62443-2-4:2015)
This European Standard was approved by CENELEC on 2019-04-03. CENELEC members are bound to comply with the CEN/CENELEC
Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration.
Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC
Management Centre or to any CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by translation
under the responsibility of a CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the
same status as the official versions.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,
Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia,
Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden,
Switzerland, Turkey and the United Kingdom.

European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2019 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.
Ref. No. EN IEC 62443-2-4:2019 E

European foreword
This document (EN IEC 62443-2-4:2019) consists of the text of IEC 62443-2-4:2015 prepared by
IEC/TC 65 "Industrial-process measurement, control and automation".
The following dates are fixed:
• latest date by which the document has to be implemented at national (dop) 2020-04-03
level by publication of an identical national standard or by endorsement
• latest date by which the national standards conflicting with the (dow) 2022-04-03
document have to be withdrawn
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CENELEC shall not be held responsible for identifying any or all such patent rights.

Endorsement notice
The text of the International Standard IEC 62443-2-4:2015 was approved by CENELEC as a
European Standard without any modification.
In the official version, for Bibliography, the following notes have to be added for the standards
indicated:
IEC 61508 (series) NOTE Harmonized as EN 61508 (series)
IEC 61511 (series) NOTE Harmonized as EN 61511 (series)
IEC 62264-1:2013 NOTE Harmonized as EN 62264-1:2013 (not modified)
IEC 62443-3-3:2013 NOTE Harmonized as EN IEC 62443-3-3:2019 (not modified)
IEC 62443-4-1 NOTE Harmonized as EN IEC 62443-4-1
IEC 62443-4-2 NOTE Harmonized as EN IEC 62443-4-2

IEC 62443-2-4 ®
Edition 1.0 2015-06
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Security for industrial automation and control systems –

Part 2-4: Security program requirements for IACS service providers

Sécurité des automatismes industriels et des systèmes de commande –

Partie 2-4: Exigences de programme de sécurité pour les fournisseurs de

service IACS
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
INTERNATIONALE
ICS 25.040.40; 35.040; 35.100 ISBN 978-2-8322-2767-1

– 2 – IEC 62443-2-4:2015 © IEC 2015
CONTENTS
FOREWORD. 3
INTRODUCTION . 5
1 Scope . 6
2 Normative references . 7
3 Terms, definitions, abbreviated terms and acronyms . 7
3.1 Terms and definitions . 7
3.2 Abbreviations . 10
4 Concepts . 11
4.1 Use of IEC 62443-2-4 . 11
4.1.1 Use of IEC 62443-2-4 by IACS service providers . 11
4.1.2 Use of IEC 62443-2-4 by IACS asset owners . 12
4.1.3 Use of IEC 62443-2-4 during negotiations between IACS asset owners
and IACS service providers . 12
4.1.4 Profiles . 12
4.1.5 IACS integration service providers . 13
4.1.6 IACS maintenance service providers . 13
4.2 Maturity model . 14
5 Requirements overview . 15
5.1 Contents . 15
5.2 Sorting and filtering . 15
5.3 IEC 62264-1 hierarchy model . 16
5.4 Requirements table columns . 16
5.5 Column definitions . 16
5.5.1 Req ID column . 16
5.5.2 BR/RE column . 16
5.5.3 Functional area column . 17
5.5.4 Topic column . 18
5.5.5 Subtopic column . 19
5.5.6 Documentation column . 21
5.5.7 Requirement description. 21
5.5.8 Rationale . 21
Annex A (normative) Security requirements . 22
Bibliography . 85

Figure 1 – Parts of the IEC 62443 Series . 5
Figure 2 – Scope of service provider capabilities . 6

Table 1 – Maturity levels . 15
Table 2 – Columns . 16
Table 3 – Functional area column values . 18
Table 4 – Topic column values . 19
Table 5 – Subtopic column values . 20
Table A.1 – Security program requirements . 22

IEC 62443-2-4:2015 © IEC 2015 – 3 –
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –
Part 2-4: Security program requirements
for IACS service providers
FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
International Standard IEC 62443-2-4 has been prepared by IEC technical committee 65:
Industrial-process measurement, control and automation.
This publication contains an attached file in the form of an Excel 97-2003 spreadsheet version
of Table A.1. This file is intended to be used as a complement and does not form an integral
part of the publication.
The text of this standard is based on the following documents:
CDV Report on voting
65/545/CDV 65/561A/RVC
Full information on the voting for the approval of this standard can be found in the report on
voting indicated in the above table.

– 4 – IEC 62443-2-4:2015 © IEC 2015
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2.
A list of all parts in the IEC 62443 series, published under the general title Security for
industrial automation and control systems, can be found on the IEC website.
Future standards in this series will carry the new general title as cited above. Titles of existing
standards in this series will be updated at the time of the next edition.
The committee has decided that the contents of this publication will remain unchanged until
the stability date indicated on the IEC web site under "http://webstore.iec.ch" in the data
related to the specific publication. At this date, the publication will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
The contents of the corrigendum of August 2015 have been included in this copy.

IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates
that it contains colours which are considered to be useful for the correct
understanding of its contents. Users should therefore print this document using a
colour printer.
IEC 62443-2-4:2015 © IEC 2015 – 5 –
INTRODUCTION
This standard is the part of the IEC 62443 series that contains security requirements for
providers of integration and maintenance services for Industrial Automation and Control
Systems (IACS). It has been developed by IEC Technical Committee 65 in collaboration with
the International Instrumentation Users Association, referred to as the WIB from its original
and now obsolete Dutch name, and ISA 99 committee members.
Figure 1 illustrates the relationship of the different parts of IEC 62443 being developed. Those
that are normatively referenced are included in the list of normative references in Clause 2,
and those that are referenced for informational purposes or that are in development are listed
in the Bibliography.
IEC 62443-1.1 IEC TR-62443-1.2 IEC 62443-1.3 IEC TR-62443-1.4
Terminology,
Master glossary of System security IACS security
concepts and models
terms and abbreviations compliance metrics lifecycle and use-case
IEC 62443-2.1 IEC TR-62443-2.2 IEC TR-62443-2.3 IEC 62443-2.4
Requirements for an Security program
Implementation guidance
Patch management in
IACS security requirements for
for an IACS security
the IACS environment
management system IACS service providers
management system
IEC TR-62443-3.1 IEC 62443-3.2 IEC 62443-3.3
System security
Security technologies Security levels for
requirements and
for IACS zones and conduits
security levels
IEC 62443-4.1 IEC 62443-4.2
Technical security
Product development
requirements for IACS
requirements
components
IEC
Figure 1 – Parts of the IEC 62443 Series
Policies and
Component System
General
procedures
– 6 – IEC 62443-2-4:2015 © IEC 2015
SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –
Part 2-4: Security program requirements
for IACS service providers
1 Scope
This part of IEC 62443-2-4 specifies requirements for security capabilities for IACS service
providers that they can offer to the asset owner during integration and maintenance activities
of an Automation Solution.
NOTE 1 The term “Automation Solution” is used as a proper noun (and therefore capitalized) in this part of
IEC 62443 to prevent confusion with other uses of this term.
Collectively, the security capabilities offered by an IACS service provider are referred to as its
Security Program. In a related specification, IEC 62443-2-1 describes requirements for the
Security Management System of the asset owner.
NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related.
Figure 2 illustrates how the integration and maintenance capabilities relate to the IACS and
the control system product that is integrated into the Automation Solution. Some of these
capabilities reference security measures defined in IEC 62443-3-3 that the service provider
must ensure are supported in the Automation Solution (either included in the control system
product or separately added to the Automation Solution).
Industrial Automation and Control System (IACS)
Operational and maintenance
Asset
operates
capabilities (policies and
Owner
procedures)
+
Automation Solution
System
integration capabilities
Safety
Basic Process
Integrator Complementary
Instrumented
(design and deployment) Control System
hardware and
System (SIS)
(BPCS)
software
IACS environment / project specific
Includes a configured instance of the Control System Product
Control System Product as a combination of
Product
develops
Supplier Supporting Embedded Network Host
Applications devices components devices
Independent of IACS environment
IEC
Figure 2 – Scope of service provider capabilities
In Figure 2, the Automation Solution is illustrated to contain a Basic Process Control System
(BPCS), optional Safety Instrumented System (SIS), and optional supporting applications,
such as advanced control. The dashed boxes indicate that these components are “optional”.

IEC 62443-2-4:2015 © IEC 2015 – 7 –
NOTE 3 The term “process” in BPCS may apply to a variety of industrial processes, including continuous
processes and manufacturing processes.
NOTE 4 Clause 4.1.4 describes profiles and how they can be used by industry groups and other organizations to
adapt this International Standard to their specific environments, including environments not based on an IACS.
NOTE 5 Automation Solutions typically have a single control system (product), but they are not restricted to do
so. In general, the Automation Solution is the set of hardware and software, independent of product packaging, that
is used to control a physical process (e.g. continuous or manufacturing) as defined by the asset owner.
2 Normative references
The following referenced documents are indispensable for the application of this document.
For dated references, only the edition cited applies. For undated references, the latest edition
of the referenced document (including any amendments) applies.
“None”
3 Terms, definitions, abbreviated terms and acronyms
3.1 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1.1
asset owner
individual or organization responsible for one or more IACSs
Note 1 to entry: Used in place of the generic word end user to provide differentiation.
Note 2 to entry: This definition includes the components that are part of the IACS.
Note 3 to entry: In the context of this standard, asset owner also includes the operator of the IACS.
3.1.2
attack surface
physical and functional interfaces of a system that can be accessed and through which the
system can be potentially exploited
Note 1 to entry: The size of the attack surface for a software interface is proportional to the number of methods
and parameters defined for the interface. Simple interfaces, therefore, have smaller attack surfaces than complex
interfaces.
Note 2 to entry: The size of the attack surface and the number of vulnerabilities are not necessarily related to
each other.
3.1.3
Automation Solution
control system and any complementary hardware and software components that have been
installed and configured to operate in an IACS
Note 1 to entry: Automation Solution is used as a proper noun in this part of IEC 62443.
Note 2 to entry: The difference between the control system and the Automation Solution is that the control system
is incorporated into the Automation Solution design (e.g. a specific number of workstations, controllers, and
devices in a specific configuration), which is then implemented. The resulting configuration is referred to as the
Automation Solution.
Note 3 to entry: The Automation Solution may be comprised of components from multiple suppliers, including the
product supplier of the control system.

– 8 – IEC 62443-2-4:2015 © IEC 2015
3.1.4
basic process control system
system that responds to input signals from the process, its associated equipment, other
programmable systems and/or an operator and generates output signals causing the process
and its associated equipment to operate in the desired manner but does not perform any
safety integrated functions (SIF)
Note 1 to entry: Safety instrumented functions are specified in the IEC 61508 series.
Note 2 to entry: The term “process” in this definition may apply to a variety of industrial processes, including
continuous processes and manufacturing processes.
3.1.5
consultant
subcontractor that provides expert advice or guidance to the integration or maintenance
service provider
3.1.6
control system
hardware and software components used in the design and implementation of an IACS
Note 1 to entry: As shown in Figure 2, control systems are composed of field devices, embedded control devices,
network devices, and host devices (including workstations and servers.
Note 2 to entry: As shown in Figure 2, control systems are represented in the Automation Solution by a BPCS and
an optional SIS.
3.1.7
handover
act of turning an Automation Solution over to the asset owner
Note 1 to entry: Handover effectively transfers responsibility for operations and maintenance of an
Automation Solution from the integration service provider to the asset owner and generally occurs after successful
completion of system test, often referred to as Site Acceptance Test (SAT).
3.1.8
industrial automation and control system
collection of personnel, hardware, software, procedures and policies involved in the operation
of the industrial process and that can affect or influence its safe, secure and reliable operation
Note 1 to entry: The IACS may include components that are not installed at the asset owner’s site.
Note 2 to entry: The definition of IACS was taken from in IEC-62443-3-3 and is illustrated in Figure 2. Examples
of IACSs include Distributed Control Systems (DCS) and Supervisory Control and Data Acquisition (SCADA)
systems. IEC 62443-2-4 also defines the proper noun “Solution” to mean the specific instance of the control system
product and possibly additional components that are designed into the IACS. The Automation Solution, therefore,
differs from the control system since it represents a specific implementation (design and configuration) of the
control system hardware and software components for a specific asset owner.
3.1.9
integration service provider
service provider that provides integration activities for an Automation Solution including
design, installation, configuration, testing, commissioning, and handover
Note 1 to entry: Integration service providers are often referred to as integrators or Main Automation Contractors
(MAC).
3.1.10
maintenance service provider
service provider that provides support activities for an Automation Solution after handover
Note 1 to entry: Maintenance is often considered to be distinguished from operation (e.g. in common colloquial
language it is often assumed that an Automation Solution is either in operation or under maintenance).
Maintenance service providers can perform support activities during operations, e.g. managing user accounts,
security monitoring, and security assessments.

IEC 62443-2-4:2015 © IEC 2015 – 9 –
3.1.11
portable media
portable devices that contain data storage capabilities that can be used to physically copy
data from one piece of equipment and transfer it to another
Note 1 to entry: Types of portable media include but are not limited to: CD / DVD / BluRay Media, USB memory
devices, smart phones, flash memory, solid state disks, hard drives, handhelds, and portable computers.
3.1.12
product supplier
manufacturer of hardware and/or software product
Note 1 to entry: Used in place of the generic word vendor to provide differentiation.
3.1.13
remote access
access to a control system through an external interface of the control system
Note 1 to entry: Examples of applications that support remote access include RDP, OPC, and Syslog.
Note 2 to entry: In general, remote access applications and the Automation Solution will reside in different
security zones as determined by the asset owner. See IEC 62443-3-2 for the application of zones and conduits to
the Automation Solution by the asset owner.
3.1.14
safety instrumented system
system used to implement functional safety
Note 1 to entry: See IEC 61508 and IEC 61511 for more information on functional safety.
3.1.15
security compromise
violation of the security of a system such that an unauthorized (1) disclosure or modification
of information or (2) denial of service may have occurred
Note 1 to entry: A security compromise represents a breach of the security of a system or an infraction of its
security policies. It is independent of impact or potential impact to the system.
3.1.16
security incident
security compromise that is of some significance to the asset owner or failed attempt to
compromise the system whose result could have been of some significance to the asset
owner
Note 1 to entry: The term “of some significance’ is relative to the environment in which the security compromise is
detected. For example, the same compromise may be declared as a security incident in one environment and not in
another. Triage activities are often used by asset owners to evaluate security compromises and identify those that
are significant enough to be considered incidents.
Note 2 to entry: In some environments, failed attempts to compromise the system, such as failed login attempts,
are considered significant enough to be classified as security incidents.
3.1.17
security patch
software patch that is relevant to the security of a software component
Note 1 to entry: For the purpose of this definition, firmware is considered software.
Note 2 to entry: Software patches may address known or potential vulnerabilities, or simply improve the security
of the software component, including its reliable operation.
3.1.18
security program
portfolio of security services, including integration services and maintenance services, and
their associated policies, procedures, and products that are applicable to the IACS

– 10 – IEC 62443-2-4:2015 © IEC 2015
Note 1 to entry: The security program for IACS service providers refers to the policies and procedures defined by
them to address security concerns of the IACS.
3.1.19
service provider
individual or organization (internal or external organization, manufacturer, etc.) that provides
a specific support service and associated supplies in accordance with an agreement with the
asset owner
Note 1 to entry: This term is used in place of the generic word “vendor” to provide differentiation.
3.1.20
subcontractor
service provider under contract to the integration or maintenance service provider or to
another subcontractor that is directly or indirectly under contract to the integration or
maintenance service provider
3.1.21
system
interacting, interrelated, or interdependent elements forming a complex whole
Note 1 to entry: A system may be packaged as a product.
Note 2 to entry: In practice, the interpretation of its meaning is frequently clarified by the use of an adjective,
such as control system. In the context of a control system, the elements are largely hardware and software
elements.
3.1.22
verify
check that the specified requirement was met
3.1.23
vulnerability
flaw or weakness in the design, implementation, or operation and management of a
component that can be exploited to cause a security compromise
Note 1 to entry: Security policies typically include policies to protect confidentiality, integrity, and availability of
system assets.
3.2 Abbreviations
AES_GCM Advanced Encryption Standard Galois/Counter Mode
BPCS Basic Process Control System
BR Base Requirement
CEF Common Event Format
DCOM Distributed Common Object Model
DCS Distributed Control System
EWS Engineering Workstation
IACS Industrial Automation and Control System
RE Requirement Enhancement
RDP Remote Desktop Protocol
RFC Request For Comment
RFQ Request For Quote
SCADA Supervisory Control And Data Acquisition
SIEM Security Information and Event Management
SIF Safety Instrumented Function
SIL Safety Integrity Level
IEC 62443-2-4:2015 © IEC 2015 – 11 –
SIS Safety Instrumented System
SNMP Simple Network Management Protocol
SOW Statement Of Work
SSID Service Set Identifier
SP Security Program
TR Technical Report
VPN Virtual Private Network
4 Concepts
4.1 Use of IEC 62443-2-4
4.1.1 Use of IEC 62443-2-4 by IACS service providers
This part of the IEC 62443 series defines requirements for security capabilities to be
supported by security programs of integration and maintenance service providers (see 4.1.3
and 4.1.6). Support for these capabilities means that the service provider can provide them to
the asset owner upon request. The terms and conditions for providing these capabilities are
beyond the scope of this standard. In addition, IEC 62443-2-4 can be used by these IACS
service providers to structure and improve their security programs.
In addition, IACS service providers can use IEC 62443-3-3 and IEC 62443-4-2 in conjunction
with IEC 62443-2-4 to work with suppliers of underlying control systems/components. This
collaboration can assist the service provider in developing policies and procedures around a
capability of a system/component, e.g. backup and restore based on the recommendations
from the suppliers of the systems/components used.
The security programs implementing these requirements are expected to be independent of
different releases of the control system that is embedded in the Automation Solution. That is a
new release of the control system product does not necessarily require a change to the
service provider’s security program. However, changes to the security program will be
required when changes to the underlying control system make the existing security program
deficient with respect to these IEC 62443-2-4 requirements.
EXAMPLE 1 A service provider may have experience with a specific control system line of products. Developing
policies and procedures for that line of products will be based on the recommendations of the product supplier and
the capabilities of the product line. Therefore, when the product capabilities for backup and restore are changed,
the corresponding capabilities of the service provider's security program (corresponding to SP.12.XX) may have to
be changed to remain consistent with the updated product capabilities. On the other hand, the service provider's
policies and procedures around non-disclosure agreements or personnel background checks (corresponding to
SP.01.03 and SP.01.04) and are very likely independent of the control system product used in the
Automation Solution.
This collaboration can also be used to improve security in these systems/components. First,
the service provider can recommend new or updated security features to the
system/component supplier. Second, the service provider can gain knowledge about the
system/component that allows it to add its own compensating security measures to the
Automation Solution during deployment or maintenance.
The requirements are specified in Annex A, and are defined in terms of the capabilities that
these security programs are required to provide. Clause 4.1.4 discusses the ability of industry
groups to subset these capabilities into profiles to address risk reduction. See IEC 62443-3-2
for more detail on security risks.
IEC 62443-2-4 also recognizes that security programs evolve and that capabilities go through
a lifecycle of their own, often starting as completely manual and evolving over time to become
more formal, more consistent, and more effective. Clause 4.2 addresses this issue of evolving
capabilities by defining a maturity model to be used with the application of this standard.

– 12 – IEC 62443-2-4:2015 © IEC 2015
EXAMPLE 2 A specific capability might be introduced as a set of manual procedures and then later supplemented
with automated tools.
As a result, the requirements in Annex A are stated abstractly, allowing for a wide range of
implementations. It is expected that service providers and asset owners will negotiate and
agree on which of these required capabilities are to be provided and how they are to be
provided. These aspects of fulfilling the requirements are beyond the scope of IEC 62443-2-4,
although the use of profiles should make this easier.
EXAMPLE 3 A service provider capable of supporting complex passwords has to be capable of supporting
specific variations of complex passwords as defined by the password policies of asset owners.
EXAMPLE 4 Many capabilities have a timeliness aspect related to their performance. What is considered timely
should be agreed to by both the asset owner and the service provider.
4.1.2 Use of IEC 62443-2-4 by IACS asset owners
IEC 62443-2-4 can be used by asset owners to request specific security capabilities from the
service provider. More specifically, prior to such a request, IEC 62443-2-4 can be used by
asset owners to determine whether or not a specific service provider’s security program
includes the capabilities that the asset owner needs.
In general, IEC 62443-2-4 recognizes that asset owner requirements vary, so it has been
written to encourage service providers to implement the required capabilities so that they can
be adaptable to a wide variety of asset owners. The maturity model also allows asset owners
to better understand the maturity of a specific service provider’s capabilities.
4.1.3 Use of IEC 62443-2-4 during negotiations between IACS asset owners and IACS
service providers
Prior to the IACS service provider starting work on the Automation Solution, the asset owner
will normally issue a Request for Quote (RFQ)) that includes a document (e.g. a Statement of
Work (SOW)) that defines its security policies and requirements, including which of the
requirements specified in Annex A apply. See IEC 62443-3-2 for more information on defining
security requirements. Service providers respond to the RFQ and negotiations follow in which
the service provider and the asset owner come to agreement on the details of the SOW (or
similar document). Typically the specific responsibilities and capabilities of the service
provider for supporting asset owner security policies and requirements will be included in or
referenced by this agreement/contract between the IACS service provider and the asset
owner.
NOTE 1 When the service provider is part of the asset owner’s organization, there may not be such a contract.
Additionally, the asset owner does not normally specify how its security requirements (e.g.
backup and restore) will be implemented – that is what the service provider has already
specified in its policies and procedures. However, the asset owner may define constraints and
parameters (e.g. password timeout values) for how the service provider’s policies and
procedures will be applied in its specific project.
In cases where the asset owner does not specify security requirements, the service provider
may propose them to the asset owner based on its own security analysis, and then negotiate
which are included in the SOW.
It is also expected that the IACS service provider will have some ability to customize its
capabilities to meet the needs of the asset owner. However, specification of this
customization is beyond the scope of IEC 62443-2-4.
4.1.4 Profiles
Profiles are capability sets defined by selecting a specific subset of the requirements in Annex
A. Profiles are intended to be written for different industry groups/sectors and other
organizations to define one or more capability sets most appropriate to their needs.

IEC 62443-2-4:2015 © IEC 2015 – 13 –
IEC Technical Reports (TRs) can be created by industry groups/sectors or other organizations
to define profiles. Each TR may define one or more profiles, and each profile identifies a
subset of the requirements defined in Annex A.
It is anticipated that asset owners will select existing profiles to specify the requirements that
they need for their Automation Solutions.
4.1.5 IACS integration service providers
An IACS integration service provider is an organization, typically separate from and under
contract to the asset owner that provides capabilities to implement/deploy
Automation Solutions according to asset owner requirements. Integration service provider
activates generally occur in the time frame starting with the design phase and ending in
handover of the Automation Solution to the asset owner.
NOTE 1 The integration service provider can be an organization within the asset owner’s organization.
IACS integration service provider activities typically include:
a) analyzing the physical, electrical, or mechanical environment the Automation Solution is to
control (e.g. the physical process to be controlled, such as those used in manufacturing,
refining and pharmaceutical processes),
b) developing an Automation Solution architecture in terms of devices and control loops and
their interconnectivity with engineering and operator workstations, and possibly the
inclusion of a Safety Instrumented System (SIS),
c) defining how the Automation Solution will connect to external (e.g. plant) networks,
d) installing, configuring, patching, backing up, and testing that lead to the handover of the
Automation Solution to the asset owner for operation.
e) gaining approval of the asset owner for many of the decisions made and outputs
generated during the execution of these activities.
This description of integration service provider activates is abstract and may exclude some of
these activities or include other activities that generally precede the handover of the
Automation Solution. Also, these activities include participation with the asset owner to
ensure the asset owner requirements are met.
From the perspective of IEC 62443, integration service providers are also expected to
participate in the assessment of security risks for the Automation Solution or to use the
results of such an assessment provided by the asset owner. The service provider is also
expected to use capabilities required by 62443-2-4 in its security program to address these
risks.
NOTE 2 See IEC 62443-3-2 for guidance on the use of risk assessments and the definition of security
requirements.
4.1.6 IACS maintenance service providers
An IACS maintenance service provider is any organization, typically separate from and under
contract to the asset owner, that performs activities to maintain and service
Automation Solutions according to asset owner requirements.
Maintenance activities are separate from activities used to operate the Automation Solution
and generally fall into two categories, those that apply specifically to maintaining the security
of the Automation Solution, and those that apply to maintaining other aspects of the
Automation Solution, such as device and equipment maintenance, but that have the
responsibility to ensure that security is not degraded as a result of these activities.
NOTE 1 The maintenance service provider can be an organization within the asset owner’s organization.

– 14 – IEC 62443-2-4:2015 © IEC 2015
NOTE 2 There can be one or more maintenance service providers maintaining the Automation Solution at the
same time or in sequence.
Maintenance activities generally start after handover of the Automation Solution to the asset
owner has occurred and may continue until the asset owner no longer requires them. They
are typically short and frequently recurring, and typically include one of more of the following:
a) patching and anti-virus updates,
b) equipment upgrades and maintenance, including small engineering adjustments not
directly related to control algorithms,
c) component and system migration,
d) change management,
e) contingency plan management.
All maintenance activities include some level of security awareness independent of whether or
not they are directly security related. No activity should reduce the security posture of the
after it has been completed.
This description of maintenance activates is abstract and may include other activities
generally following the handover of the Automation Solution. Also, these activities include
participation with the asset owner to ensure the asset owner requirements are met.
From the perspective of the IEC 62443 series, maintenance service providers, like integration
service providers, are
...


SLOVENSKI STANDARD
01-november-2019
Zaščita industrijske avtomatizacije in nadzornih sistemov - 2-4. del: Zahteve za
program varnosti zaščite za ponudnike storitev IACS (IEC 62443-2-4:2015)
Security for industrial automation and control systems - Part 2-4: Security program
requirements for IACS service providers (IEC 62443-2-4:2015)
IT-Sicherheit für industrielle Automatisierungssysteme - Teil 2-4: Anforderungen an das
IT-Sicherheitsprogramm von Dienstleistern für industrielle Automatisierungssysteme
(IEC 62443-2-4:2015)
Sécurité des automatismes industriels et des systèmes de commande Partie 2-4:
Exigences de programme de sécurité pour les fournisseurs de service IACS (IEC 62443-
2-4:2015)
Ta slovenski standard je istoveten z: EN IEC 62443-2-4:2019
ICS:
25.040.01 Sistemi za avtomatizacijo v Industrial automation
industriji na splošno systems in general
35.030 Informacijska varnost IT Security
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD EN IEC 62443-2-4

NORME EUROPÉENNE
EUROPÄISCHE NORM
April 2019
ICS 25.040.40; 35.100.05
English Version
Security for industrial automation and control systems - Part 2-4:
Security program requirements for IACS service providers
(IEC 62443-2-4:2015)
Sécurité des automatismes industriels et des systèmes de IT-Sicherheit für industrielle Automatisierungssysteme - Teil
commande - Partie 2-4: Exigences de programme de 2-4: Anforderungen an das IT-Sicherheitsprogramm von
sécurité pour les fournisseurs de service IACS Dienstleistern für industrielle Automatisierungssysteme
(IEC 62443-2-4:2015) (IEC 62443-2-4:2015)
This European Standard was approved by CENELEC on 2019-04-03. CENELEC members are bound to comply with the CEN/CENELEC
Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration.
Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC
Management Centre or to any CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by translation
under the responsibility of a CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the
same status as the official versions.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,
Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia,
Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden,
Switzerland, Turkey and the United Kingdom.

European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2019 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.
Ref. No. EN IEC 62443-2-4:2019 E

European foreword
This document (EN IEC 62443-2-4:2019) consists of the text of IEC 62443-2-4:2015 prepared by
IEC/TC 65 "Industrial-process measurement, control and automation".
The following dates are fixed:
• latest date by which the document has to be implemented at national (dop) 2020-04-03
level by publication of an identical national standard or by endorsement
• latest date by which the national standards conflicting with the (dow) 2022-04-03
document have to be withdrawn
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CENELEC shall not be held responsible for identifying any or all such patent rights.

Endorsement notice
The text of the International Standard IEC 62443-2-4:2015 was approved by CENELEC as a
European Standard without any modification.
In the official version, for Bibliography, the following notes have to be added for the standards
indicated:
IEC 61508 (series) NOTE Harmonized as EN 61508 (series)
IEC 61511 (series) NOTE Harmonized as EN 61511 (series)
IEC 62264-1:2013 NOTE Harmonized as EN 62264-1:2013 (not modified)
IEC 62443-3-3:2013 NOTE Harmonized as EN IEC 62443-3-3:2019 (not modified)
IEC 62443-4-1 NOTE Harmonized as EN IEC 62443-4-1
IEC 62443-4-2 NOTE Harmonized as EN IEC 62443-4-2

IEC 62443-2-4 ®
Edition 1.0 2015-06
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Security for industrial automation and control systems –

Part 2-4: Security program requirements for IACS service providers

Sécurité des automatismes industriels et des systèmes de commande –

Partie 2-4: Exigences de programme de sécurité pour les fournisseurs de

service IACS
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
INTERNATIONALE
ICS 25.040.40; 35.040; 35.100 ISBN 978-2-8322-2767-1

– 2 – IEC 62443-2-4:2015 © IEC 2015
CONTENTS
FOREWORD. 3
INTRODUCTION . 5
1 Scope . 6
2 Normative references . 7
3 Terms, definitions, abbreviated terms and acronyms . 7
3.1 Terms and definitions . 7
3.2 Abbreviations . 10
4 Concepts . 11
4.1 Use of IEC 62443-2-4 . 11
4.1.1 Use of IEC 62443-2-4 by IACS service providers . 11
4.1.2 Use of IEC 62443-2-4 by IACS asset owners . 12
4.1.3 Use of IEC 62443-2-4 during negotiations between IACS asset owners
and IACS service providers . 12
4.1.4 Profiles . 12
4.1.5 IACS integration service providers . 13
4.1.6 IACS maintenance service providers . 13
4.2 Maturity model . 14
5 Requirements overview . 15
5.1 Contents . 15
5.2 Sorting and filtering . 15
5.3 IEC 62264-1 hierarchy model . 16
5.4 Requirements table columns . 16
5.5 Column definitions . 16
5.5.1 Req ID column . 16
5.5.2 BR/RE column . 16
5.5.3 Functional area column . 17
5.5.4 Topic column . 18
5.5.5 Subtopic column . 19
5.5.6 Documentation column . 21
5.5.7 Requirement description. 21
5.5.8 Rationale . 21
Annex A (normative) Security requirements . 22
Bibliography . 85

Figure 1 – Parts of the IEC 62443 Series . 5
Figure 2 – Scope of service provider capabilities . 6

Table 1 – Maturity levels . 15
Table 2 – Columns . 16
Table 3 – Functional area column values . 18
Table 4 – Topic column values . 19
Table 5 – Subtopic column values . 20
Table A.1 – Security program requirements . 22

IEC 62443-2-4:2015 © IEC 2015 – 3 –
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –
Part 2-4: Security program requirements
for IACS service providers
FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
International Standard IEC 62443-2-4 has been prepared by IEC technical committee 65:
Industrial-process measurement, control and automation.
This publication contains an attached file in the form of an Excel 97-2003 spreadsheet version
of Table A.1. This file is intended to be used as a complement and does not form an integral
part of the publication.
The text of this standard is based on the following documents:
CDV Report on voting
65/545/CDV 65/561A/RVC
Full information on the voting for the approval of this standard can be found in the report on
voting indicated in the above table.

– 4 – IEC 62443-2-4:2015 © IEC 2015
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2.
A list of all parts in the IEC 62443 series, published under the general title Security for
industrial automation and control systems, can be found on the IEC website.
Future standards in this series will carry the new general title as cited above. Titles of existing
standards in this series will be updated at the time of the next edition.
The committee has decided that the contents of this publication will remain unchanged until
the stability date indicated on the IEC web site under "http://webstore.iec.ch" in the data
related to the specific publication. At this date, the publication will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
The contents of the corrigendum of August 2015 have been included in this copy.

IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates
that it contains colours which are considered to be useful for the correct
understanding of its contents. Users should therefore print this document using a
colour printer.
IEC 62443-2-4:2015 © IEC 2015 – 5 –
INTRODUCTION
This standard is the part of the IEC 62443 series that contains security requirements for
providers of integration and maintenance services for Industrial Automation and Control
Systems (IACS). It has been developed by IEC Technical Committee 65 in collaboration with
the International Instrumentation Users Association, referred to as the WIB from its original
and now obsolete Dutch name, and ISA 99 committee members.
Figure 1 illustrates the relationship of the different parts of IEC 62443 being developed. Those
that are normatively referenced are included in the list of normative references in Clause 2,
and those that are referenced for informational purposes or that are in development are listed
in the Bibliography.
IEC 62443-1.1 IEC TR-62443-1.2 IEC 62443-1.3 IEC TR-62443-1.4
Terminology,
Master glossary of System security IACS security
concepts and models
terms and abbreviations compliance metrics lifecycle and use-case
IEC 62443-2.1 IEC TR-62443-2.2 IEC TR-62443-2.3 IEC 62443-2.4
Requirements for an Security program
Implementation guidance
Patch management in
IACS security requirements for
for an IACS security
the IACS environment
management system IACS service providers
management system
IEC TR-62443-3.1 IEC 62443-3.2 IEC 62443-3.3
System security
Security technologies Security levels for
requirements and
for IACS zones and conduits
security levels
IEC 62443-4.1 IEC 62443-4.2
Technical security
Product development
requirements for IACS
requirements
components
IEC
Figure 1 – Parts of the IEC 62443 Series
Policies and
Component System
General
procedures
– 6 – IEC 62443-2-4:2015 © IEC 2015
SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –
Part 2-4: Security program requirements
for IACS service providers
1 Scope
This part of IEC 62443-2-4 specifies requirements for security capabilities for IACS service
providers that they can offer to the asset owner during integration and maintenance activities
of an Automation Solution.
NOTE 1 The term “Automation Solution” is used as a proper noun (and therefore capitalized) in this part of
IEC 62443 to prevent confusion with other uses of this term.
Collectively, the security capabilities offered by an IACS service provider are referred to as its
Security Program. In a related specification, IEC 62443-2-1 describes requirements for the
Security Management System of the asset owner.
NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related.
Figure 2 illustrates how the integration and maintenance capabilities relate to the IACS and
the control system product that is integrated into the Automation Solution. Some of these
capabilities reference security measures defined in IEC 62443-3-3 that the service provider
must ensure are supported in the Automation Solution (either included in the control system
product or separately added to the Automation Solution).
Industrial Automation and Control System (IACS)
Operational and maintenance
Asset
operates
capabilities (policies and
Owner
procedures)
+
Automation Solution
System
integration capabilities
Safety
Basic Process
Integrator Complementary
Instrumented
(design and deployment) Control System
hardware and
System (SIS)
(BPCS)
software
IACS environment / project specific
Includes a configured instance of the Control System Product
Control System Product as a combination of
Product
develops
Supplier Supporting Embedded Network Host
Applications devices components devices
Independent of IACS environment
IEC
Figure 2 – Scope of service provider capabilities
In Figure 2, the Automation Solution is illustrated to contain a Basic Process Control System
(BPCS), optional Safety Instrumented System (SIS), and optional supporting applications,
such as advanced control. The dashed boxes indicate that these components are “optional”.

IEC 62443-2-4:2015 © IEC 2015 – 7 –
NOTE 3 The term “process” in BPCS may apply to a variety of industrial processes, including continuous
processes and manufacturing processes.
NOTE 4 Clause 4.1.4 describes profiles and how they can be used by industry groups and other organizations to
adapt this International Standard to their specific environments, including environments not based on an IACS.
NOTE 5 Automation Solutions typically have a single control system (product), but they are not restricted to do
so. In general, the Automation Solution is the set of hardware and software, independent of product packaging, that
is used to control a physical process (e.g. continuous or manufacturing) as defined by the asset owner.
2 Normative references
The following referenced documents are indispensable for the application of this document.
For dated references, only the edition cited applies. For undated references, the latest edition
of the referenced document (including any amendments) applies.
“None”
3 Terms, definitions, abbreviated terms and acronyms
3.1 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1.1
asset owner
individual or organization responsible for one or more IACSs
Note 1 to entry: Used in place of the generic word end user to provide differentiation.
Note 2 to entry: This definition includes the components that are part of the IACS.
Note 3 to entry: In the context of this standard, asset owner also includes the operator of the IACS.
3.1.2
attack surface
physical and functional interfaces of a system that can be accessed and through which the
system can be potentially exploited
Note 1 to entry: The size of the attack surface for a software interface is proportional to the number of methods
and parameters defined for the interface. Simple interfaces, therefore, have smaller attack surfaces than complex
interfaces.
Note 2 to entry: The size of the attack surface and the number of vulnerabilities are not necessarily related to
each other.
3.1.3
Automation Solution
control system and any complementary hardware and software components that have been
installed and configured to operate in an IACS
Note 1 to entry: Automation Solution is used as a proper noun in this part of IEC 62443.
Note 2 to entry: The difference between the control system and the Automation Solution is that the control system
is incorporated into the Automation Solution design (e.g. a specific number of workstations, controllers, and
devices in a specific configuration), which is then implemented. The resulting configuration is referred to as the
Automation Solution.
Note 3 to entry: The Automation Solution may be comprised of components from multiple suppliers, including the
product supplier of the control system.

– 8 – IEC 62443-2-4:2015 © IEC 2015
3.1.4
basic process control system
system that responds to input signals from the process, its associated equipment, other
programmable systems and/or an operator and generates output signals causing the process
and its associated equipment to operate in the desired manner but does not perform any
safety integrated functions (SIF)
Note 1 to entry: Safety instrumented functions are specified in the IEC 61508 series.
Note 2 to entry: The term “process” in this definition may apply to a variety of industrial processes, including
continuous processes and manufacturing processes.
3.1.5
consultant
subcontractor that provides expert advice or guidance to the integration or maintenance
service provider
3.1.6
control system
hardware and software components used in the design and implementation of an IACS
Note 1 to entry: As shown in Figure 2, control systems are composed of field devices, embedded control devices,
network devices, and host devices (including workstations and servers.
Note 2 to entry: As shown in Figure 2, control systems are represented in the Automation Solution by a BPCS and
an optional SIS.
3.1.7
handover
act of turning an Automation Solution over to the asset owner
Note 1 to entry: Handover effectively transfers responsibility for operations and maintenance of an
Automation Solution from the integration service provider to the asset owner and generally occurs after successful
completion of system test, often referred to as Site Acceptance Test (SAT).
3.1.8
industrial automation and control system
collection of personnel, hardware, software, procedures and policies involved in the operation
of the industrial process and that can affect or influence its safe, secure and reliable operation
Note 1 to entry: The IACS may include components that are not installed at the asset owner’s site.
Note 2 to entry: The definition of IACS was taken from in IEC-62443-3-3 and is illustrated in Figure 2. Examples
of IACSs include Distributed Control Systems (DCS) and Supervisory Control and Data Acquisition (SCADA)
systems. IEC 62443-2-4 also defines the proper noun “Solution” to mean the specific instance of the control system
product and possibly additional components that are designed into the IACS. The Automation Solution, therefore,
differs from the control system since it represents a specific implementation (design and configuration) of the
control system hardware and software components for a specific asset owner.
3.1.9
integration service provider
service provider that provides integration activities for an Automation Solution including
design, installation, configuration, testing, commissioning, and handover
Note 1 to entry: Integration service providers are often referred to as integrators or Main Automation Contractors
(MAC).
3.1.10
maintenance service provider
service provider that provides support activities for an Automation Solution after handover
Note 1 to entry: Maintenance is often considered to be distinguished from operation (e.g. in common colloquial
language it is often assumed that an Automation Solution is either in operation or under maintenance).
Maintenance service providers can perform support activities during operations, e.g. managing user accounts,
security monitoring, and security assessments.

IEC 62443-2-4:2015 © IEC 2015 – 9 –
3.1.11
portable media
portable devices that contain data storage capabilities that can be used to physically copy
data from one piece of equipment and transfer it to another
Note 1 to entry: Types of portable media include but are not limited to: CD / DVD / BluRay Media, USB memory
devices, smart phones, flash memory, solid state disks, hard drives, handhelds, and portable computers.
3.1.12
product supplier
manufacturer of hardware and/or software product
Note 1 to entry: Used in place of the generic word vendor to provide differentiation.
3.1.13
remote access
access to a control system through an external interface of the control system
Note 1 to entry: Examples of applications that support remote access include RDP, OPC, and Syslog.
Note 2 to entry: In general, remote access applications and the Automation Solution will reside in different
security zones as determined by the asset owner. See IEC 62443-3-2 for the application of zones and conduits to
the Automation Solution by the asset owner.
3.1.14
safety instrumented system
system used to implement functional safety
Note 1 to entry: See IEC 61508 and IEC 61511 for more information on functional safety.
3.1.15
security compromise
violation of the security of a system such that an unauthorized (1) disclosure or modification
of information or (2) denial of service may have occurred
Note 1 to entry: A security compromise represents a breach of the security of a system or an infraction of its
security policies. It is independent of impact or potential impact to the system.
3.1.16
security incident
security compromise that is of some significance to the asset owner or failed attempt to
compromise the system whose result could have been of some significance to the asset
owner
Note 1 to entry: The term “of some significance’ is relative to the environment in which the security compromise is
detected. For example, the same compromise may be declared as a security incident in one environment and not in
another. Triage activities are often used by asset owners to evaluate security compromises and identify those that
are significant enough to be considered incidents.
Note 2 to entry: In some environments, failed attempts to compromise the system, such as failed login attempts,
are considered significant enough to be classified as security incidents.
3.1.17
security patch
software patch that is relevant to the security of a software component
Note 1 to entry: For the purpose of this definition, firmware is considered software.
Note 2 to entry: Software patches may address known or potential vulnerabilities, or simply improve the security
of the software component, including its reliable operation.
3.1.18
security program
portfolio of security services, including integration services and maintenance services, and
their associated policies, procedures, and products that are applicable to the IACS

– 10 – IEC 62443-2-4:2015 © IEC 2015
Note 1 to entry: The security program for IACS service providers refers to the policies and procedures defined by
them to address security concerns of the IACS.
3.1.19
service provider
individual or organization (internal or external organization, manufacturer, etc.) that provides
a specific support service and associated supplies in accordance with an agreement with the
asset owner
Note 1 to entry: This term is used in place of the generic word “vendor” to provide differentiation.
3.1.20
subcontractor
service provider under contract to the integration or maintenance service provider or to
another subcontractor that is directly or indirectly under contract to the integration or
maintenance service provider
3.1.21
system
interacting, interrelated, or interdependent elements forming a complex whole
Note 1 to entry: A system may be packaged as a product.
Note 2 to entry: In practice, the interpretation of its meaning is frequently clarified by the use of an adjective,
such as control system. In the context of a control system, the elements are largely hardware and software
elements.
3.1.22
verify
check that the specified requirement was met
3.1.23
vulnerability
flaw or weakness in the design, implementation, or operation and management of a
component that can be exploited to cause a security compromise
Note 1 to entry: Security policies typically include policies to protect confidentiality, integrity, and availability of
system assets.
3.2 Abbreviations
AES_GCM Advanced Encryption Standard Galois/Counter Mode
BPCS Basic Process Control System
BR Base Requirement
CEF Common Event Format
DCOM Distributed Common Object Model
DCS Distributed Control System
EWS Engineering Workstation
IACS Industrial Automation and Control System
RE Requirement Enhancement
RDP Remote Desktop Protocol
RFC Request For Comment
RFQ Request For Quote
SCADA Supervisory Control And Data Acquisition
SIEM Security Information and Event Management
SIF Safety Instrumented Function
SIL Safety Integrity Level
IEC 62443-2-4:2015 © IEC 2015 – 11 –
SIS Safety Instrumented System
SNMP Simple Network Management Protocol
SOW Statement Of Work
SSID Service Set Identifier
SP Security Program
TR Technical Report
VPN Virtual Private Network
4 Concepts
4.1 Use of IEC 62443-2-4
4.1.1 Use of IEC 62443-2-4 by IACS service providers
This part of the IEC 62443 series defines requirements for security capabilities to be
supported by security programs of integration and maintenance service providers (see 4.1.3
and 4.1.6). Support for these capabilities means that the service provider can provide them to
the asset owner upon request. The terms and conditions for providing these capabilities are
beyond the scope of this standard. In addition, IEC 62443-2-4 can be used by these IACS
service providers to structure and improve their security programs.
In addition, IACS service providers can use IEC 62443-3-3 and IEC 62443-4-2 in conjunction
with IEC 62443-2-4 to work with suppliers of underlying control systems/components. This
collaboration can assist the service provider in developing policies and procedures around a
capability of a system/component, e.g. backup and restore based on the recommendations
from the suppliers of the systems/components used.
The security programs implementing these requirements are expected to be independent of
different releases of the control system that is embedded in the Automation Solution. That is a
new release of the control system product does not necessarily require a change to the
service provider’s security program. However, changes to the security program will be
required when changes to the underlying control system make the existing security program
deficient with respect to these IEC 62443-2-4 requirements.
EXAMPLE 1 A service provider may have experience with a specific control system line of products. Developing
policies and procedures for that line of products will be based on the recommendations of the product supplier and
the capabilities of the product line. Therefore, when the product capabilities for backup and restore are changed,
the corresponding capabilities of the service provider's security program (corresponding to SP.12.XX) may have to
be changed to remain consistent with the updated product capabilities. On the other hand, the service provider's
policies and procedures around non-disclosure agreements or personnel background checks (corresponding to
SP.01.03 and SP.01.04) and are very likely independent of the control system product used in the
Automation Solution.
This collaboration can also be used to improve security in these systems/components. First,
the service provider can recommend new or updated security features to the
system/component supplier. Second, the service provider can gain knowledge about the
system/component that allows it to add its own compensating security measures to the
Automation Solution during deployment or maintenance.
The requirements are specified in Annex A, and are defined in terms of the capabilities that
these security programs are required to provide. Clause 4.1.4 discusses the ability of industry
groups to subset these capabilities into profiles to address risk reduction. See IEC 62443-3-2
for more detail on security risks.
IEC 62443-2-4 also recognizes that security programs evolve and that capabilities go through
a lifecycle of their own, often starting as completely manual and evolving over time to become
more formal, more consistent, and more effective. Clause 4.2 addresses this issue of evolving
capabilities by defining a maturity model to be used with the application of this standard.

– 12 – IEC 62443-2-4:2015 © IEC 2015
EXAMPLE 2 A specific capability might be introduced as a set of manual procedures and then later supplemented
with automated tools.
As a result, the requirements in Annex A are stated abstractly, allowing for a wide range of
implementations. It is expected that service providers and asset owners will negotiate and
agree on which of these required capabilities are to be provided and how they are to be
provided. These aspects of fulfilling the requirements are beyond the scope of IEC 62443-2-4,
although the use of profiles should make this easier.
EXAMPLE 3 A service provider capable of supporting complex passwords has to be capable of supporting
specific variations of complex passwords as defined by the password policies of asset owners.
EXAMPLE 4 Many capabilities have a timeliness aspect related to their performance. What is considered timely
should be agreed to by both the asset owner and the service provider.
4.1.2 Use of IEC 62443-2-4 by IACS asset owners
IEC 62443-2-4 can be used by asset owners to request specific security capabilities from the
service provider. More specifically, prior to such a request, IEC 62443-2-4 can be used by
asset owners to determine whether or not a specific service provider’s security program
includes the capabilities that the asset owner needs.
In general, IEC 62443-2-4 recognizes that asset owner requirements vary, so it has been
written to encourage service providers to implement the required capabilities so that they can
be adaptable to a wide variety of asset owners. The maturity model also allows asset owners
to better understand the maturity of a specific service provider’s capabilities.
4.1.3 Use of IEC 62443-2-4 during negotiations between IACS asset owners and IACS
service providers
Prior to the IACS service provider starting work on the Automation Solution, the asset owner
will normally issue a Request for Quote (RFQ)) that includes a document (e.g. a Statement of
Work (SOW)) that defines its security policies and requirements, including which of the
requirements specified in Annex A apply. See IEC 62443-3-2 for more information on defining
security requirements. Service providers respond to the RFQ and negotiations follow in which
the service provider and the asset owner come to agreement on the details of the SOW (or
similar document). Typically the specific responsibilities and capabilities of the service
provider for supporting asset owner security policies and requirements will be included in or
referenced by this agreement/contract between the IACS service provider and the asset
owner.
NOTE 1 When the service provider is part of the asset owner’s organization, there may not be such a contract.
Additionally, the asset owner does not normally specify how its security requirements (e.g.
backup and restore) will be implemented – that is what the service provider has already
specified in its policies and procedures. However, the asset owner may define constraints and
parameters (e.g. password timeout values) for how the service provider’s policies and
procedures will be applied in its specific project.
In cases where the asset owner does not specify security requirements, the service provider
may propose them to the asset owner based on its own security analysis, and then negotiate
which are included in the SOW.
It is also expected that the IACS service provider will have some ability to customize its
capabilities to meet the needs of the asset owner. However, specification of this
customization is beyond the scope of IEC 62443-2-4.
4.1.4 Profiles
Profiles are capability sets defined by selecting a specific subset of the requirements in Annex
A. Profiles are intended to be written for different industry groups/sectors and other
organizations to define one or more capability sets most appropriate to their needs.

IEC 62443-2-4:2015 © IEC 2015 – 13 –
IEC Technical Reports (TRs) can be created by industry groups/sectors or other organizations
to define profiles. Each TR may define one or more profiles, and each profile identifies a
subset of the requirements defined in Annex A.
It is anticipated that asset owners will select existing profiles to specify the requirements that
they need for their Automation Solutions.
4.1.5 IACS integration service providers
An IACS integration service provider is an organization, typically separate from and under
contract to the asset owner that provides capabilities to implement/deploy
Automation Solutions according to asset owner requirements. Integration service provider
activates generally occur in the time frame starting with the design phase and ending in
handover of the Automation Solution to the asset owner.
NOTE 1 The integration service provider can be an organization within the asset owner’s organization.
IACS integration service provider activities typically include:
a) analyzing the physical, electrical, or mechanical environment the Automation Solution is to
control (e.g. the physical process to be controlled, such as those used in manufacturing,
refining and pharmaceutical processes),
b) developing an Automation Solution architecture in terms of devices and control loops and
their interconnectivity with engineering and operator workstations, and possibly the
inclusion of a Safety Instrumented System (SIS),
c) defining how the Automation Solution will connect to external (e.g. plant) networks,
d) installing, configuring, patching, backing up, and testing that lead to the handover of the
Automation Solution to the asset owner for operation.
e) gaining approval of the asset owner for many of the decisions made and outputs
generated during the execution of these activities.
This description of integration service provider activates is abstract and may exclude some of
these activities or include other activities that generally precede the handover of the
Automation Solution. Also, these activities include participation with the asset owner to
ensure the asset owner requirements are met.
From the perspective of IEC 62443, integration service providers are also expected to
participate in the assessment of security risks for the Automation Solution or to use the
results of such an assessment provided by the asset owner. The service provider is also
expected to use capabilities required by 62443-2-4 in its security program to address these
risks.
NOTE 2 See IEC 62443-3-2 for guidance on the use of risk assessments and the definition of security
requirements.
4.1.6 IACS maintenance service providers
An IACS maintenance service provider is any organization, typically separate from and under
contract to the asset owner, that performs activities to maintain and service
Automation Solutions according to asset owner requirements.
Maintenance activities are separate from activities used to operate the Automation Solution
and generally fall into two categories, those that apply specifically to maintaining the security
of the Automation Solution, and those that apply to maintaining other aspects of the
Automation Solution, such as device and equipment maintenance, but that have the
responsibility to ensure that security is not degraded as a result of these activities.
NOTE 1 The maintenance service provider can be an organization within the asset owner’s organization.

– 14 – IEC 62443-2-4:2015 © IEC 2015
NOTE 2 There can be one or more maintenance service providers maintaining the Automation Solution at the
same time or in sequence.
Maintenance activities generally start after handover of the Automation Solution to the asset
owner has occurred and may continue until the asset owner no longer requires them. They
are typically short and frequently recurring, and typically include one of more of the following:
a) patching and anti-virus updates,
b) equipment upgrades and maintenance, including small engineering adjustments not
directly related to control algorithms,
c) component and system migration,
d) change management,
e) contingency plan management.
All maintenance activities include some level of security awareness independent of whether or
not they are directly security related. No activity should reduce the security posture of the
after it has been completed.
This description of maintenance activates is abstract and may include other activities
generally following the handover of the Automation Solution. Also, these activities include
participation with the asset owner to ensure the asset owner requirements are met.
From the perspective of the IEC 62443 series, maintenance service providers, like integration
service providers, are
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

SIST EN IEC 62443-2-4:2019는 산업 자동화 및 제어 시스템(IACS) 서비스 제공업체를 위한 보안 프로그램 요구 사항을 명확히 규명하고 있습니다. 이 문서는 IACS 서비스 제공자가 자동화 솔루션의 통합 및 유지 관리 활동 중 자산 소유자에게 제공할 수 있는 보안 기능의 종합적인 요구 사항 세트를 포함합니다. 이 표준의 주요 강점은 특정 산업 그룹 및 조직에 따라 요구 사항을 세분화하여 적용할 수 있는 프로필 개발을 허용한다는 점입니다. 이는 다양한 환경에 적합하게 문서를 조정할 수 있도록 하며, IACS 기반이 아닌 환경에서도 적용될 수 있는 유연성을 제공합니다. 보안 기능은 정책, 절차, 실천 및 인력 관련으로 구성되어 있어, IACS 서비스 제공업체가 자산 소유자에게 효과적이고 포괄적인 보안을 제공할 수 있도록 지원합니다. 또한, IEC 62443-3-3에서 정의된 보안 조치를 참조함으로써 서비스 제공자가 자동화 솔루션 내에서 반드시 지원해야 하는 사항들을 명확히 하고 있습니다. 이로 인해, 서비스 제공자는 통합 및 유지 관리 능력이 IACS와 제어 시스템 제품에 어떻게 연관되는지를 보다 명확히 이해할 수 있습니다. SIST EN IEC 62443-2-4:2019의 관련성과 포괄성은 오늘날 산업 환경에서 필수적인 요소로, 자산 소유자와 서비스 제공자 간의 신뢰를 구축하고 보안 위험을 최소화하는 데 기여할 수 있습니다.

Die Norm EN IEC 62443-2-4:2019 bietet einen umfassenden Rahmen für Sicherheitsanforderungen, die IACS-Dienstleistern (Industrial Automation and Control Systems) während der Integration und Wartung von Automatisierungslösungen an Eigentümer von Anlagen bereitgestellt werden. Diese Norm stellt sicher, dass die Sicherheitskapazitäten systematisch bewertet und implementiert werden, um eine hohe Sicherheit in industriellen Automatisierungsumgebungen zu gewährleisten. Ein hervorzuhebender Aspekt der Norm ist ihre Flexibilität. Subklause 4.1.4 ermöglicht die Entwicklung spezifischer Profile, die es verschiedenen Industriegruppen und Organisationen erlauben, die Anforderungen zielgerichtet anzupassen. Diese Profile sind entscheidend, um die Norm auf spezifische Umgebungen zu adaptieren, die möglicherweise nicht direkt auf integrierte Automatisierungssysteme (IACS) basieren. Ein weiterer Stärke der Norm sind die klar definierten Sicherheitsfähigkeiten, die als Teil des Sicherheitsprogramms eines IACS-Dienstleisters betrachtet werden. Diese Sicherheitsfähigkeiten umfassen Richtlinien, Verfahren, Praktiken und Personalressourcen und sind damit ein integraler Bestandteil des Sicherheitsmanagements. Die Norm schafft so eine Verbindung zwischen den praktischen Aspekten der Integration und Wartung sowie den übergeordneten Sicherheitszielen. Im Zusammenhang mit IEC 62443-2-1, das Anforderungen für das Sicherheitsmanagementsystem des Anlagenbesitzers beschreibt, wird deutlich, dass die Sicherheitsanforderungen eng miteinander verknüpft sind. Dies fördert ein ganzheitliches Sicherheitsverständnis und die verantwortungsvolle Handhabung von Automatisierungslösungen. Die Norm hebt auch die Notwendigkeit hervor, dass die Sicherheitsmaßnahmen aus IEC 62443-3-3 von den Dienstleistern unterstützt werden. Dies stellt sicher, dass Sicherheitslösungen nicht nur theoretisch vorhanden sind, sondern auch praktisch in die Automatisierungssysteme integriert werden, was die Relevanz der Norm für die aktuelle Sicherheitslage in der Industrie unterstreicht. Alles in allem ist EN IEC 62443-2-4:2019 ein unabdingbares Dokument, das die Sicherheitsstandards für IACS-Dienstleister definiert und erhebliche Vorteile für die Sicherheit in der industriellen Automatisierung bietet.

SIST EN IEC 62443-2-4:2019は、産業自動化および制御システム(IACS)のサービスプロバイダー向けのセキュリティプログラム要件を明確に定義したドキュメントです。この標準の範囲は、資産所有者が自動化ソリューションの統合および保守活動を行う際に、IACSサービスプロバイダーが提供できるセキュリティ機能に対する包括的な要件のセットを指定しています。このアプローチにより、さまざまな業種や組織に特有のニーズに応じて要件を調整できるプロファイルの開発が可能となります。 この標準の強みは、IACSサービスプロバイダーが提案する「セキュリティプログラム」に完全に依存し、これにより自動化ソリューションにおけるセキュリティ能力を明確に理解できる点にあります。具体的には、ポリシー、手続き、実践、及び人員に関連するセキュリティ機能が規定され、サービスプロバイダーは、提供する自動化ソリューションがIEC 62443-3-3で定義されたセキュリティ対策をサポートすることを確保しなければなりません。 さらに、標準は自動化ソリューションがIACSや制御システム製品とどのように統合されるかを示す図を通じて、具体的な統合と保守能力の関連性を視覚的に明示しています。この図は、実装に関与する関係者にとって役立つリソースであり、セキュリティ対策がどのように機能するかを理解する助けとなります。 この標準は、産業界におけるセキュリティの重要性を再認識させ、特に自動化ソリューションを統合及び保守する上でのセキュリティ要件の有用性を強調しています。各セクションは、実践的で適用可能なガイダンスを提供し、業界全体におけるセキュリティのレベルを向上させるための基盤を形成しています。このように、EN IEC 62443-2-4:2019は、産業自動化および制御システムのセキュリティにおける重要な規範となっており、発展を続ける技術環境においてもその relevancy を維持し続けることが期待されます。

The EN IEC 62443-2-4:2019 standard provides a robust framework for security program requirements specifically tailored for IACS (Industrial Automation and Control Systems) service providers. Its scope encompasses the extensive security capabilities that these providers must offer to asset owners throughout the integration and maintenance phases of an Automation Solution. This ensures that the services provided not only adhere to industry best practices but also align with the diverse security needs of various sectors. A significant strength of this standard is its flexibility, which is facilitated by Subclause 4.1.4 that allows for the creation of Profiles. This adaptability is crucial as it enables stakeholders to customize the requirements to fit the specific contexts and challenges faced within different environments, even those not traditionally linked to IACS. This nuanced approach ensures that the standard is applicable across a broad spectrum of industries, enhancing its relevance in today's industrial landscape. Moreover, the comprehensive delineation of security capabilities-including policies, procedures, practices, and personnel requirements-fortifies the overall Security Program of IACS service providers. By emphasizing the integration and maintenance capabilities, the standard highlights the critical relationship between these activities and the overarching control system products included within the Automation Solution. Furthermore, by referencing key security measures from IEC 62443-3-3, it ensures that the necessary protections are adequately integrated or supplemented within the Automation Solution. In summary, EN IEC 62443-2-4:2019 stands out as a vital document that not only outlines essential security protocols but also offers a tailored approach suited to various operational realities. Its focus on the comprehensive security program and the adaptability through Profiles strongly positions it as a relevant standard in the dynamic field of industrial automation and control systems.

Le document SIST EN IEC 62443-2-4:2019 présente une norme essentielle pour la sécurité des systèmes d'automatisation et de contrôle industriel (IACS). Son objectif principal est de définir un ensemble complet d'exigences relatives aux capacités de sécurité que les fournisseurs de services IACS peuvent proposer aux propriétaires d'actifs durant les activités d'intégration et de maintenance d'une solution d'automatisation. Cela assure que les enjeux de sécurité sont intégrés dès le début des processus d'automatisation. Une des forces majeures de cette norme est sa flexibilité. En effet, toutes les exigences ne s'appliquent pas à tous les groupes industriels et organisations. Le sous-clause 4.1.4 permet le développement de Profils, qui facilitent l'adaptation des exigences à des environnements spécifiques, y compris ceux qui ne sont pas basés sur un IACS. Cette approche sur mesure est cruciale pour garantir que les exigences en matière de sécurité soient pertinentes et applicables, augmentant ainsi la pertinence de la norme dans divers secteurs. Le document clarifie également que les capacités de sécurité offertes par un fournisseur de services IACS sont collectivement désignées comme son Programme de Sécurité. Cela permet de garantir une compréhension cohérente des engagements en matière de sécurité entre les parties prenantes. De plus, il établit des liens directs avec d'autres normes, tels que l'IEC 62443-2-1, qui décrivent les exigences pour le Système de Gestion de la Sécurité du propriétaire de l'actif, renforçant ainsi l'interopérabilité et la cohérence au sein des normes IEC 62443. Enfin, cette norme aborde non seulement les capacités liées aux politiques, procédures et pratiques, mais veille également à ce que les mesures de sécurité définies dans l'IEC 62443-3-3 soient intégrées ou ajoutées à la solution d'automatisation. Cette attention aux détails garantit que la sécurité est considérée de manière holistique, un aspect de plus en plus crucial dans le paysage technologique actuel où la convergence des systèmes pose des défis importants en matière de sécurité. En somme, le SIST EN IEC 62443-2-4:2019 représente une référence incontournable pour toute l'industrie abordant la sécurité des systèmes d'automatisation et de contrôle, offrant à la fois une structure robuste et adaptable pour répondre aux besoins diversifiés des fournisseurs et des propriétaires d'actifs.