IEC 62881:2018/COR1:2019
(Corrigendum)Corrigendum 1 - Cause and effect matrix
Corrigendum 1 - Cause and effect matrix
Corrigendum 1 - Matrice des causes et effets
General Information
Relations
Standards Content (Sample)
IEC 2019
INTERNATIONAL ELECTROTECHNICAL COMMISSION
COMMISSION ÉLECTROTECHNIQUE INTERNATIONALE
____________
IEC 62881 IEC 62881
Edition 1.0 2018-10 Édition 1.0 2018-10
CAUSE AND EFFECT MATRIX MATRICE DES CAUSES ET EFFETS
CO RRI G E NDUM 1
Corrections to the French version appear after the English text.
Les corrections à la version française sont données après le texte anglais.
IEC 62881:2018-10/COR1:2019-04(en-fr)
...
This May Also Interest You
IEC PAS 62443-2-2: 2025 provides guidance on the development, validation, operation, and maintenance of a set of technical, physical, and process security measures called Security Protection Scheme (SPS). The document’s goal is to provide the asset owner implementing an IACS Security Program (SP) with mechanisms and procedures to ensure that the design, implementation and operation of an SPS manage the risks resulting from cyberthreats to each of the IACS included in its operating facility.
The document is based on contents specified in other documents of the IEC 62443 series and explains how these contents can be used to support the development of technical, physical, and process security measures addressing the risks to the IACS during the operation phase.
- Technical specification44 pagesEnglish languagesale 15% off
IEC TR 63283-5:2024 describes the market and innovation trend analysis affecting smart manufacturing (SM). The market and innovation trends will influence the evolution of smart manufacturing and it will be important to have good insights on these trends. Specific aspects of the market trends are the evolution of the business cases that is assumed to highlight new supplier chain models, new revenue streams, new customer services, and/or new customer segments.
The document will address the following topics:
• Market watch: Identify the important, likely, and/or disruptive market trends (e.g. mass customization) from an end-to-end perspective, which impact smart manufacturing topics/aspects. This includes the end-user, producers, supply chain, regulators, etc.
• Business model watch: Identify the new business model trends from an end-to-end perspective, which impact smart manufacturing.
• Technological watch: Identify the important, likely, and/or disruptive innovations (AI chipsets, 6G, quantum computing, etc.) describing the impacted smart manufacturing topics/aspects; this topic will focus on those technologies that are still under development but is assumed to influence (or is assumed to be influenced by) smart manufacturing.
There are many more new trends which are used in SM. In this document, only some frequently discussed trends are presented. Some technologies are considered to have priority according to their maturity.
This work will focus on how they can be used in SM.
- Technical report67 pagesEnglish languagesale 15% off
IEC 61010-2-201:2024 supplements or modifies the corresponding clauses in IEC 61010-1 so as to convert that publication into the IEC standard: Particular requirements for control equipment. This document is to be used in conjunction with IEC 61010-1:2010, and IEC 61010 1:2010/AMD1:2016. Where a particular subclause of IEC 61010-1 is not mentioned in this document, that subclause applies as far as is reasonable. Where this document states "addition", "modification", "replacement", or "deletion", the relevant requirement, test specification or note in IEC 61010 1 should be adapted accordingly.
This edition includes the following significant technical changes with respect to the previous edition:
a) 1.1.1: the related equipment included in the Scope has been clarified;
b) 4.3.2.101: the optical fibre module has been deleted;
c) 5.4.3: equipment installation has been clarified;
d) 6.7.1.1: revision of the figure representing insulation between separate circuits has been included;
e) 6.7.101: the subclause relating to insulation for FIELD WIRING TERMINALS of OVERVOLTAGE CATEGORY ll with a nominal voltage up to 1 000 V has been deleted;
f) 6.7.1.101: a new subclause relating to insulation for SELV/PELV CIRCUITS has been included;
g) 6.8.3: specification of voltage tester has been added;
h) 6.9.3: an additional exception relating to colour coding has been included;
i) 6.9.101: a new subclause relating to wiring for secondary circuits e.g. SELV/PELV has been included;
j) 8.2.2.101: additional requirements for glass displays have been included;
k) 8.3: the subclause relating to the drop test has been removed;
l) 9.3.2: additional requirements for material of connectors and insulating material have been included;
m) The particular requirements for non-metallic material have been clarified;
n) Clause 11: the particular requirements for protection against HAZARDS from fluid and solid foreign objects have been removed;
o) 12.4: an additional subclause relating to microwave radiation has been included;
p) 14.102: the description of switching devices has been clarified;
- Standard165 pagesEnglish and French languagesale 15% off
IEC 62443-2-1:2024 specifies asset owner security program (SP) policy and procedure requirements for an industrial automation and control system (IACS) in operation. This document uses the broad definition and scope of what constitutes an IACS as described in IEC TS 62443‑1‑1. In the context of this document, asset owner also includes the operator of the IACS.
This document recognizes that the lifespan of an IACS can exceed twenty years, and that many legacy systems contain hardware and software that are no longer supported. Therefore, the SP for most legacy systems addresses only a subset of the requirements defined in this document. For example, if IACS or component software is no longer supported, security patching requirements cannot be met. Similarly, backup software for many older systems is not available for all components of the IACS. This document does not specify that an IACS has these technical requirements. This document states that the asset owner needs to have policies and procedures around these types of requirements. In the case where an asset owner has legacy systems that do not have the native technical capabilities, compensating security measures can be part of the policies and procedures specified in this document.
This edition includes the following significant technical changes with respect to the previous edition:
a) revised requirement structure into SP elements (SPEs),
b) revised requirements to eliminate duplication of an information security management system (ISMS), and
c) defined a maturity model for evaluating requirements.
- Standard189 pagesEnglish and French languagesale 15% off
IEC TS 62443-6-1:2024 specifies the evaluation methodology to support interested parties (e.g. during conformity assessment activities) to achieve repeatable and reproducible evaluation results against IEC 62443-2-4 requirements. This document is intended for first-party, second-party or third-party conformity assessment activity, for example by product suppliers, service providers, asset owners and conformity assessment bodies.
NOTE 1 62443-2-4 specifies requirements for security capabilities of an IACS service provider. These security capabilities can be offered as a security program during integration and maintenance of an automation solution.
NOTE 2 The term “conformity assessment” and the terms first-party conformity assessment activity, second-party conformity assessment activity and third-party conformity assessment activity are defined in ISO/IEC 17000.
- Technical specification132 pagesEnglish languagesale 15% off
IEC 62443-2:2023 specifies a comprehensive set of requirements for security-related processes that IACS service providers can offer to the asset owner during integration and maintenance activities of an Automation Solution. Because not all requirements apply to all industry groups and organizations, Subclause 4.1.4 provides for the development of "profiles" that allow for the subsetting of these requirements. Profiles are used to adapt this document to specific environments, including environments not based on an IACS.
NOTE 1 The term "Automation Solution" is used as a proper noun (and therefore capitalized) in this document to prevent confusion with other uses of this term. Collectively, the security processes offered by an IACS service provider are referred to as its Security Program (SP) for IACS asset owners. In a related specification, IEC 62443-2-1 describes requirements for the Security Management System of the asset owner.
NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related. Figure 1 illustrates the integration and maintenance security processes of the asset owner, service provider(s), and product supplier(s) of an IACS and their relationships to each other and to the Automation Solution. Some of the requirements of this document relating to the safety program are associated with security requirements described in IEC 62443-3-3 and IEC 62443-4-2.
NOTE 3 The IACS is a combination of the Automation Solution and the organizational measures necessary for its design, deployment, operation, and maintenance.
NOTE 4 Maintenance of legacy system with insufficient security technical capabilities, implementation of policies, processes and procedures can be addressed through risk mitigation.
- Standard194 pagesEnglish and French languagesale 15% off
IEC TS 62443-1-5:2023 specifies a scheme for defining (selecting, writing, drafting, creating) IEC 62443 security profiles.
This scheme and its specified requirements apply to IEC 62443 security profiles which are planned to be published as part of the upcoming IEC 62443 dedicated security profiles sub-series.
IEC 62443 security profiles can support interested parties (e.g. during conformity assessment activities) to achieve comparability of assessed IEC 62443 requirements.
- Technical specification16 pagesEnglish languagesale 15% off
- Standard1 pageEnglish and French languagesale 15% off
IEC TR 63283-3:2022(E) identifies challenges which apply to the engineering of a smart manufacturing facility related to cybersecurity.
- Technical report54 pagesEnglish languagesale 15% off
IEC TR 63283-1:2022(E) is to compile a comprehensive collection of base terminology with compatible terms that can become relevant within the scope of Smart Manufacturing. Most of these terms refer to existing definitions in the domain of industrial-process measurement, control and automation and its various subdomains. When multiple similar definitions exist for the exact same term in different standards, this document contains only the preferred definition in the context of Smart Manufacturing. Whenever the existing definitions are not compatible with other terms in this document or when the definition does not fit into the broader scope of Smart Manufacturing, new or modified definitions are given.
- Technical report81 pagesEnglish languagesale 15% off
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.