IEC GUIDE 120:2023
(Main)Security aspects - Guidelines for their inclusion in publications
Security aspects - Guidelines for their inclusion in publications
IEC Guide 120:2023 provides guidelines on the security aspects included in IEC publications, and how to implement them. These guidelines can be used as a checklist for the combination of publications used in implementation of systems. This document includes what is often referred to as "cybersecurity". This document excludes non-electrotechnical aspects of security such as societal security, except where they directly interact with electrotechnical security.
Aspects liés à la sûreté - Lignes directrices pour les inclure dans les publications
L'IEC Guide 120:2023 fournit des lignes directrices concernant les aspects liés à la sûreté inclus dans les publications de l'IEC et la façon de les mettre en œuvre. Les présentes lignes directrices peuvent servir de liste de contrôle pour la combinaison des publications utilisées dans la mise en œuvre des systèmes. Le présent document couvre ce qui est souvent appelé la "cybersécurité". Le présent document ne couvre pas les aspects non électrotechniques liés à la sûreté, tels que la sûreté sociétale, sauf s'ils interagissent directement avec la sûreté électrotechnique.
General Information
- Status
- Published
- Publication Date
- 10-Oct-2023
- Technical Committee
- IEC/TC - IEC/TC
- Current Stage
- PPUB - Publication issued
- Start Date
- 11-Oct-2023
- Completion Date
- 23-Feb-2023
Relations
- Effective Date
- 05-Sep-2023
Overview
IEC Guide 120:2023 - Security aspects – Guidelines for their inclusion in publications provides structured guidance for how security (including what is commonly called cybersecurity) should be addressed in IEC publications. It helps IEC technical committees and standards authors determine which security topics to include, how to implement them in standards, and how to use multiple publications together as a checklist when implementing systems. The Guide applies to IEC publication types (International Standards, Technical Reports, Technical Specifications, Guides) and excludes non‑electrotechnical societal security except where it directly interacts with electrotechnical security.
Key Topics
- Publication categorization: guidance on classifying publications (basic/horizontal, group, product, guidance, test) to ensure consistent treatment of security across domains.
- Terminology alignment: harmonization with IEC Guide 108:2019 and recommended primary/secondary sources for consistent security terms.
- Lifecycle and holistic view: adoption of a lifecycle approach and system-level (holistic) perspective for security requirements and resilience.
- Security risk assessment: iterative risk assessment, scenario analysis, risk mitigation strategy, validation, and maintaining safe operation.
- Security controls and strategies: defence‑in‑depth, vulnerability handling, security management, and selected measures for protecting systems.
- Supply chain and deployment considerations: guidance on supply‑chain security, and for both greenfield and brownfield environments.
- Interrelation with functional safety: principles for aligning security measures with functional safety requirements.
- Conformity assessment: considerations when writing standards that may be subject to conformity assessment.
- Practical development advice: recommendations for publication writers, mapping of relevant publications, and decision flow charts to support consistent standardization.
Practical Applications
- Use as a checklist when developing or updating IEC standards to ensure security aspects are covered consistently.
- Guide standards writers in adding security clauses to product standards, group standards, or domain‑specific documents.
- Help conformity assessment bodies and implementers understand the intended security scope and risk‑based expectations in IEC publications.
- Support system architects, product developers, and integrators to align design and procurement decisions with standardized security guidance and lifecycle practices.
Who Should Use This Standard
- IEC technical committees, subcommittees and systems committees
- Standards writers and editors
- Product and system developers in electrotechnical domains
- Conformity assessment and certification bodies
- Security program managers responsible for standards compliance
Related Standards
- IEC Guide 108:2019 (terminology alignment)
- Relevant IEC horizontal and domain‑specific standards referenced within Guide 120 for detailed controls, testing and implementation (see Guide 120 bibliography and mapping tables).
Keywords: IEC Guide 120, cybersecurity, security aspects, IEC publications, security risk assessment, defence-in-depth, supply chain security, lifecycle approach, functional safety, standardization.
IEC GUIDE 120:2023 RLV - Security aspects - Guidelines for their inclusion in publications Released:10/11/2023 Isbn:9782832276761
IEC GUIDE 120:2023 - Security aspects - Guidelines for their inclusion in publications Released:11. 10. 2023
Frequently Asked Questions
IEC GUIDE 120:2023 is a guide published by the International Electrotechnical Commission (IEC). Its full title is "Security aspects - Guidelines for their inclusion in publications". This standard covers: IEC Guide 120:2023 provides guidelines on the security aspects included in IEC publications, and how to implement them. These guidelines can be used as a checklist for the combination of publications used in implementation of systems. This document includes what is often referred to as "cybersecurity". This document excludes non-electrotechnical aspects of security such as societal security, except where they directly interact with electrotechnical security.
IEC Guide 120:2023 provides guidelines on the security aspects included in IEC publications, and how to implement them. These guidelines can be used as a checklist for the combination of publications used in implementation of systems. This document includes what is often referred to as "cybersecurity". This document excludes non-electrotechnical aspects of security such as societal security, except where they directly interact with electrotechnical security.
IEC GUIDE 120:2023 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.
IEC GUIDE 120:2023 has the following relationships with other standards: It is inter standard links to IEC GUIDE 120:2018. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase IEC GUIDE 120:2023 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of IEC standards.
Standards Content (Sample)
IEC GUIDE 120 ®
Edition 2.0 2023-10
REDLINE VERSION
GUIDE
colour
inside
Security aspects – Guidelines for their inclusion in publications
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.
IEC Secretariat Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.
About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigendum or an amendment might have been published.
IEC publications search - webstore.iec.ch/advsearchform IEC Products & Services Portal - products.iec.ch
The advanced search enables to find IEC publications by a Discover our powerful search engine and read freely all the
variety of criteria (reference number, text, technical publications previews. With a subscription you will always have
committee, …). It also gives information on projects, replaced access to up to date content tailored to your needs.
and withdrawn publications.
Electropedia - www.electropedia.org
IEC Just Published - webstore.iec.ch/justpublished
The world's leading online dictionary on electrotechnology,
Stay up to date on all new IEC publications. Just Published
containing more than 22 300 terminological entries in English
details all new publications released. Available online and once
and French, with equivalent terms in 19 additional languages.
a month by email.
Also known as the International Electrotechnical Vocabulary
(IEV) online.
IEC Customer Service Centre - webstore.iec.ch/csc
If you wish to give us your feedback on this publication or need
further assistance, please contact the Customer Service
Centre: sales@iec.ch.
IEC GUIDE 120 ®
Edition 2.0 2023-10
REDLINE VERSION
GUIDE
colour
inside
Security aspects – Guidelines for their inclusion in publications
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
ICS 35.030 ISBN 978-2-8322-7676-1
– 2 – IEC GUIDE 120:2023 RLV © IEC 2023
CONTENTS
FOREWORD . 4
INTRODUCTION . 2
1 Scope . 7
2 Normative references . 7
3 Terms and definitions . 7
4 Guide to terminology . 10
4.1 General . 10
4.2 Primary recommended sources . 10
4.3 Other relevant sources . 10
4.3.1 General . 10
4.3.2 Other application-domain independent sources. 11
4.3.3 Other application-domain specific sources . 11
5 Categorization of publications . 11
5.1 Overview. 13
5.2 Publication type .
5.2.1 General .
5.2.2 Base security publications .
5.2.3 Group security publications .
5.2.4 Product security publications .
5.2.5 Guidance security publications .
5.2.6 Test security publications .
5.2.7 Relationship between types of security publications .
5.2 Publication categories . 15
5.2.1 General . 15
5.2.2 Horizontal publication – Basic security publications (applicable to any
domain) . 15
5.2.3 Horizontal publication – Group security publications . 15
5.2.4 Product security publications . 16
5.3 Publication types . 16
5.3.1 General . 16
5.3.2 Guidance security publications . 16
5.3.3 Test methods security publications . 16
5.4 Application domain. 16
5.5 Content . 17
5.6 User or target group . 17
5.7 Developing security publications . 18
5.7.1 Base Basic security publications . 18
5.7.2 Horizontal publication – Group security publications . 18
5.7.3 Product security publications . 19
5.7.4 Guidance security publications and test security publications . 19
6 Mapping and overview of publications . 11
6.1 General . 19
6.2 List of relevant publications. 19
6.3 Domain table chart . 20
7 Considerations for publications development . 20
7.1 Practical considerations for publication writers . 20
7.2 Development process of security in publications . 20
7.3 Interrelation between functional safety and security . 23
7.4 Specific requirements . 24
7.4.1 Relationship with base security publications "Horizontal publication –
Basic security publications" . 24
7.4.2 Consider conformity assessment when writing standards . 24
7.4.3 IEC Horizontal security functions and Group security functions . 25
7.4.4 Lifecycle approach . 25
7.4.5 Holistic system view . 26
7.4.6 Vulnerability handling . 26
7.4.7 Defence-in-depth . 26
7.4.8 Security management . 26
7.4.9 Supply chain . 27
7.4.10 Consider greenfield and brownfield . 27
7.4.11 Use of term integrity . 27
7.5 Security risk assessment . 27
7.5.1 General . 27
7.5.2 Iterative process of security risk assessment and risk mitigation . 28
7.5.3 Maintaining safe operation . 28
7.5.4 Scenario analysis . 29
7.5.5 Security risk mitigation strategy . 29
7.5.6 Validation . 30
Bibliography . 31
Figure 1 – Possible categorization of publications .
Figure 1 – Examples of publications according to different categorization classes . 15
Figure 2 – Publications and application domains . 20
Figure 3 – Example of security requirements, threats, and possible attacks . 21
Figure 4 – Decision flow chart . 22
Figure 5 – Interrelation between functional safety and security . 23
Figure 6 – Example of security management cycle for an organization . 25
Figure 7 – Selected measures for defence-in-depth strategy . 26
Figure 8 – Possible impact of security risk or risks on the safety-related control system . 29
Table 1 – Possible categorization of publications . 14
– 4 – IEC GUIDE 120:2023 RLV © IEC 2023
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
SECURITY ASPECTS – GUIDELINES FOR
THEIR INCLUSION IN PUBLICATIONS
FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote international
co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and
in addition to other activities, IEC publishes International Standards, Technical Specifications, Technical Reports,
Publicly Available Specifications (PAS) and Guides (hereafter referred to as "IEC Publication(s)"). Their
preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with
may participate in this preparatory work. International, governmental and non-governmental organizations liaising
with the IEC also participate in this preparation. IEC collaborates closely with the International Organization for
Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence between
any IEC Publication and the corresponding national or regional publication shall be clearly indicated in the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of patent
rights. IEC shall not be held responsible for identifying any or all such patent rights.
This redline version of the official IEC Standard allows the user to identify the changes made to
the previous edition IEC Guide 120:2018. A vertical bar appears in the margin wherever a change
has been made. Additions are in green text, deletions are in strikethrough red text.
This second edition of IEC Guide 120 has been prepared, in accordance with
ISO/IEC Directives, Part 1, Annex A, by the Advisory Committee on Information security and
data privacy (ACSEC).
This second edition cancels and replaces the first edition published in 2018.
The main changes with respect to the previous edition are as follows:
a) The terminology of IEC Guide 120 has been aligned with the terminology of
IEC Guide 108:2019.
The text of this Guide is based on the following documents:
Draft Report on voting
SMBNC/39/DV SMBNC/47/RV
Full information on the voting for the approval of this Guide can be found in the report on voting
indicated in the above table.
The language used for the development of this Guide is English.
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2, and
developed in accordance with ISO/IEC Directives, Part 1 and ISO/IEC Directives, IEC
Supplement, available at www.iec.ch/members_experts/refdocs. The main document types
developed by IEC are described in greater detail at www.iec.ch/standardsdev/publications.
IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates that it
contains colours which are considered to be useful for the correct understanding of its
contents. Users should therefore print this document using a colour printer.
– 6 – IEC GUIDE 120:2023 RLV © IEC 2023
INTRODUCTION
The increasing complexity and connectivity of systems, products, processes and services
entering the market requires that the consideration of security aspects be given a high priority.
Inclusion of security aspects in standardization provides protection from and response to risks
of unintentionally and intentionally caused events that can disrupt the functionality and
operation of products and systems.
When preparing publications, committees should ensure that relevant resilience requirements
applicable to their application domain are included. Security aspects will in many cases play a
role in achieving resilience directed standards.
In this document, the term "committee", includes technical committees, subcommittees and
systems committees. The term "publication" includes "International Standard", "Technical
Report", "Technical Specification" and "Guide".
National laws (legislation and regulation) may override legal and regulatory requirements can
exist that impact the general application of publications.
NOTE Publications can deal exclusively with security aspects or can include clauses specific to security.
SECURITY ASPECTS – GUIDELINES FOR
THEIR INCLUSION IN PUBLICATIONS
1 Scope
This document provides guidelines on the security topics to be covered aspects included in IEC
publications, and aspects of how to implement them. These guidelines can be used as a
checklist for the combination of publications used in implementation of systems.
This document includes what is often referred to as "cybersecurity".
This document excludes non-electrotechnical aspects of security such as societal security,
except where they directly interact with electrotechnical security.
NOTE The IEC Standardization Management Board (SMB) has decided that Guides such as this one can have
mandatory requirements which shall be followed by all IEC committees developing technical work that falls within the
scope of the Guide, as well as guidance which may or may not be followed. Any mandatory requirements in this
Guide are identified by the use of "shall". Statements that are only for guidance are identified by using the verb
"should". (See ISO/IEC Directives, IEC Supplement:2021, A.1.1.)
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies.
For undated references, the latest edition of the referenced document (including any
amendments) applies.
ISO/IEC Directives Part 2:2018, Principles and rules for the structure and drafting of ISO and
IEC documents
There are no normative references in this document
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminology databases for use in standardization at the following
addresses:
• IEC Electropedia: available at https://www.electropedia.org/
• ISO Online browsing platform: available at https://www.iso.org/obp
3.1
accountability
property of a system (including all of its system resources) that ensures that the actions of a
system entity may can be traced uniquely to that entity, which can be held responsible for its
actions
[SOURCE: IEC TS 62443-1-1:2009, 3.2.3]
– 8 – IEC GUIDE 120:2023 RLV © IEC 2023
3.2
attack
attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make
unauthorized use of an asset
[SOURCE: ISO/IEC 27000:20162018, 3.2]
3.3
authentication
provision of assurance that a claimed characteristic of an entity is correct
[SOURCE: ISO/IEC 27000:20162018, 3.5]
3.4
authorization
right or permission that is granted to a system entity to access a system resource
[SOURCE: IEC TS 62443-1-1:2009, 3.2.14]
3.5
availability
property of being accessible and usable upon demand by an authorized entity
[SOURCE: ISO/IEC 27000:20162018, 3.7]
3.6
confidentiality
property that information is not made available or disclosed to unauthorized individuals, entities,
or processes
[SOURCE: ISO/IEC 24767-1:2008, 2.1.2]
3.7
functional safety
part of the overall safety that depends on functional and physical units operating correctly in
response to their inputs
[SOURCE: IEC 60050-351:2013, 351-57-06]
3.8
harm
injury or damage to the health of people, or damage to property or the environment
[SOURCE: ISO/IEC Guide 51:2014, 3.1]
3.9
integrity
property of accuracy and completeness
[SOURCE: ISO/IEC 27000:20162018, 3.36]
3.10
non-repudiation
ability to prove the occurrence of a claimed event or action and its originating entities
[SOURCE: ISO/IEC 27000:20162018, 3.48]
3.11
risk
combination of the probability of occurrence of harm and the severity of that harm
Note 1 to entry: The probability of security risks often cannot be determined in the same way as the probability of
safety hazards based on statistical analysis.
[SOURCE: IEC 60050-351:2013, 351-57-03, modified – Note 1 to entry has been added.]
3.12
safety
freedom from risk which is not tolerable
[SOURCE: ISO/IEC Guide 51:2014, 3.14]
3.13
security
condition that results from the establishment and maintenance of protective measures that
ensure a state of inviolability from hostile acts or influences
Note 1 to entry: Hostile acts or influences could be intentional or unintentional.
Note 2 to entry: In actual usage, "security" and "cybersecurity" are often used interchangeably, even if technically,
"cybersecurity" can be considered different from "security". However, this document does not make distinction
between these terms.
[SOURCE: IEC TS 62351-2:2008, 2.2.173, modified – Notes 1 and 2 to entry have been added.]
3.14
security control
measure (including process, policy, device, practice or other action) which modifies security
risk or use
measure which modifies security risk or use
Note 1 to entry: A security control can be a process, policy, device, practice or other action.
3.15
security service
mechanism used to provide confidentiality, data integrity, authentication, or non-repudiation of
information
[SOURCE: IEC TS 62443-1-1:2009, 3.2.115]
3.16
threat
potential for violation of security, which exists when there is a circumstance, capability, action,
or event that could breach security and cause harm
[SOURCE: IEC TS 62443-1-1:2009, 3.2.125]
3.17
vendor
manufacturer or distributor of a product
[SOURCE: IEC 62337:2012, 3.12, modified – In the definition, "piece of equipment/
instrument/package unit" has been replaced with "product".]
– 10 – IEC GUIDE 120:2023 RLV © IEC 2023
3.18
vulnerability
flaw or weakness in a system's design, implementation, or operation and management that
could be exploited to violate the system's security policy
Note 1 to entry: This definition of vulnerability should not be confused with the term vulnerability when used in the
context of general risk management, where it encompasses the notion of possibility of exposition to a risk.
[SOURCE: IEC TR 62918:2014, 3.16, modified – Note 1 to entry has been added.]
4 Guide to terminology
4.1 General
There are already many security-related terms and definitions in existing publications.
Therefore, before defining a new term, existing terms and definitions should be checked first.
Primary recommended sources are shown in 4.2 and they should be used in preference to the
other relevant sources shown in 4.3. If no appropriate term and definition is found in those
sources, either modify an existing one or define a new one.
Definitions in this document are not intended to be generic ones but only apply to this document.
The ISO/IEC Directives Part 2:20182021, Clause 16, defines how the terms and definitions in
IEC publications are drafted.
NOTE The same term might can have different definitions depending on the context in which it is used, or different
terms might can be used for the same or similar meaning in different application domains.
4.2 Primary recommended sources
The primary recommended sources are
a) IEC 60050 (all parts) (IEV) [1] ,
a) IEC Glossary [2], and
b) ISO/IEC JTC 1/SC 27 SD6 [3],
where IEC 60050 and the IEC Glossary should be used in preference.
IEC 60050 provides representative definitions to more than 20 000 terms, organized by subject
areas in IEC. The IEC Glossary is a compilation of electrotechnical terms extracted from the
"Terms and definitions" clause in existing IEC publications.
If no appropriate term or definition is found in the two sources above,
ISO/IEC JTC 1 SC 27 SD6, which covers more security-related terms and definitions, should
be consulted.
NOTE Application-domain specific terms developed by IEC committees are also considered to be primary sources.
These can be searched using the web page of the IEC Glossary.
4.3 Other relevant sources
4.3.1 General
There are a variety of resources available which focus on certain application domains of
electrotechnology such as energy, building, healthcare, and transportation.
___________
Numbers in square brackets refer to the Bibliography.
This includes application-domain independent sources (4.3.2) and application-domain specific
sources (4.3.3).
4.3.2 Other application-domain independent sources
• IETF RFC 4949 [4];
• NISTIR 7298 [5];
• IEEE, Standards Glossary [6];
• ITU, ITU Terms and Definitions [7].
4.3.3 Other application-domain specific sources
• Healthcare: HL7, Glossary Of Acronyms, Abbreviations and Terms Related To Information
Security In Healthcare Information Systems [8].
• Nuclear: IAEA, Nuclear Security Series Glossary [9].
• Energy: IEA, Glossary [10].
5 Categorization of publications
5.1 Overview
There are several different ways in which security publications can be categorised. Four
possible aspects for the categorization are shown in Figure 1. Publications can belong to more
than one category. Each category is identified by combination types of each aspect.
Figure 1 – Possible categorization of publications
5.2 Publication type
5.2.1 General
Publications for security can be categorised as one of the five types listed below, as shown in
Figure 2:
• base security publication;
– 12 – IEC GUIDE 120:2023 RLV © IEC 2023
• group security publication;
• product security publication;
• guidance security publication;
• test security publication.
NOTE The examples listed in Figure 2 are not exhaustive.
Figure 2 – Types of publications
5.2.2 Base security publications
Base security publications are publications that define some aspect of security, in a generic
manner.
Base security publications deal with fundamental concepts, principles and requirements with
regard to general security aspects applicable to a wide range of products and systems.
Horizontal standards dealing with security, as defined in IEC GUIDE 108 [14], are base security
publications.
5.2.3 Group security publications
Group security publications show how to apply security in one of the application domains. To
do this, they may reference or customise base security publications. They are equivalent to
group publications as defined in IEC GUIDE 104 [13] for safety applications.
Group security publications may be applicable to many products or systems, or families of
similar products or systems.
Group security publications are sometimes referred to as sector-specific security publications.
5.2.4 Product security publications
Product security publications define how to apply base security publications or group security
publications for a particular type of product. They ensure that different products can interact or
interoperate securely, and can be controlled and managed in a uniform manner.
Product security publications should as far as possible define their requirements by reference
to base security publications and group security publications.
NOTE In this context, the term product includes items such as process, service, installation, and combinations
thereof.
5.2.5 Guidance security publications
Guidance security publications should not contain requirements. They explain how to implement
base publications, and group or product publications.
In some application areas, guidance publications are not used. Instead necessary guidance
information is provided through informative annexes within the relevant requirements standard.
5.2.6 Test security publications
Test security publications define ways to determine that the requirements of base publications,
and group or product publications have been correctly implemented.
Test publications typically have a specialised audience and often make reference to conformity
assessment. They may define or identify reference implementations that can be used to
determine correct implementation through successful interoperation.
5.2.7 Relationship between types of security publications
The relationship between these different types of publications is shown in Figure 2. There is an
equivalent figure for safety publications in Annex B of IEC GUIDE 104:2010 [13].
5.1 Overview
There are several different ways in which security publications can be categorized. Five
possible classes for the categorization are considered as shown in Table 1:
• Publication categories;
• Publication types;
• Application domain;
• Content;
• User or target group;
Publications can belong to more than one class.
This document provides complementary information to IEC Guide 108 when referring to
horizontal security publications.
– 14 – IEC GUIDE 120:2023 RLV © IEC 2023
Table 1 – Possible categorization of publications
Publication categories Horizontal publication – Basic security publications (applicable to any domain)
Horizontal publication – Group security publications (applicable to one or several
specified domains)
Product security publications
Publication types Guidance security publications (which could be horizontal publications or not)
Test methods security publications (which could be horizontal publications or not)
Configuration
Application domain • Building
• Energy
• General
• Healthcare
• ICT
• Industrial automation
• Transportation
Content • Component
• Management
• Policy
• Process
• Subsystem
• System
• Technology
User or target group • Auditor
• Integrator
• Operator
• Maintainer
• Regulator
• Vendor
Figure 1 shows some examples of security publications listed according to the proposed
classes.
NOTE The examples listed in Figure 1 are not exhaustive.
Figure 1 – Examples of publications according to different categorization classes
5.2 Publication categories
5.2.1 General
"Publication categories" stems from IEC Guide 108:2019 and extends the definition of the
different categories proposed for horizontal publications to fully consider the security aspect
context. The publication categories considered in this document are:
• Horizontal publication – Basic security publications (applicable to any domain);
• Horizontal publication – Group security publications;
• Product security publications.
5.2.2 Horizontal publication – Basic security publications (applicable to any domain)
"Horizontal publication – Basic security publications" deal with fundamental concepts, principles
and requirements with regard to general security aspects applicable to a wide range of products
and systems, and are applicable to any domain.
5.2.3 Horizontal publication – Group security publications
"Horizontal publication – Group security publications" show how to apply security in one of the
application domains. To do this, they may reference or customize existing "Horizontal
publication – Basic security publications".
– 16 – IEC GUIDE 120:2023 RLV © IEC 2023
"Horizontal publication – Group security publications" may be applicable to many products or
systems, or families of similar products or systems.
"Horizontal publication – Group security publications" can be referred to as sector-specific
security publications.
5.2.4 Product security publications
"Product security publications" define how to apply "Horizontal publication – Basic security
publications" or "Horizontal publication – Group security publications" for a particular type of
product. They ensure that different products can interact or interoperate securely, and can be
controlled and managed in a uniform manner.
"Product security publications" should as far as possible define their requirements by reference
to "Horizontal publication – Basic security publications" or "Horizontal publication – Group
security publications".
NOTE In this context, the term "product" includes items such as process, service, installation, and combinations
thereof.
5.3 Publication types
5.3.1 General
"Publication types" stems from IEC Guide 108:2019 and extends the definition of the different
types proposed for horizontal publications to fully consider the security aspect context. The
proposed types considered in this document are:
• Guidance security publications;
• Test methods security publications.
5.3.2 Guidance security publications
"Guidance security publications" should not contain requirements. They explain how to
implement "Horizontal publication – Basic security publications", "Horizontal publication –
Group security publications" or product security publications.
In some application areas, guidance security publications are not used. Instead, necessary
guidance information is provided through informative annexes within the relevant requirements
standard.
5.3.3 Test methods security publications
"Test methods security publications" define ways to determine that the requirements of
"Horizontal publication – Basic security publications", and "Horizontal publication – Group
security publications" or product security publications have been correctly implemented.
Test methods security publications typically have a specialized audience and often make
reference to conformity assessment. They may define or identify reference implementations
that can be used to determine correct implementation through successful interoperation.
5.4 Application domain
Publications for security can also be categorized according to their intended domain of
application. This may can be a sector of economic or industrial activity, a type of market, or an
area of application.
Some examples of application domains are listed below, as shown in Figure 1:
• building/home;
• energy;
• general;
• healthcare;
• ICT;
• industrial automation;
• transportation.
In many cases an application domain will have an associated IEC committee responsible for
the development of publications for that domain. This committee should accept responsibility
for the development of the associated security publications.
Such committees will normally be able to define relevant threat models and security use cases
independently, but may it is possible that they will need to seek advice from the committees
responsible for base security publications "Horizontal publication – Basic security publications"
in configuring or customizing those base basic security publications when referenced.
5.5 Content
Publications for security can also be grouped by their type of content.
Some examples of possible groups are listed below, as shown in Figure 1:
• component;
• management;
• policy (not in IEC);
• process;
• subsystem;
• system;
• technology.
For example, electrotechnical standards for information security management include the
generic "Horizontal publication – Basic security publications" standard ISO/IEC 27001 [11]
(developed by ISO/IEC JTC 1/SC 27), but also the sector-specific standards
ISO/IEC 27019 [12] (developed by ISO/IEC JTC 1/SC 27), IEC 62443-2-1 [13] (developed by
IEC TC 65) and IEC 62645 [14] (developed by IEC SC 45A).
5.6 User/ or target group
Publications for security can also be grouped by their intended audience. Some examples of
possible user groups are listed below, as shown in Figure 1:
• auditor;
• integrator;
• operator;
• maintainer;
• regulator;
• vendor.
– 18 – IEC GUIDE 120:2023 RLV © IEC 2023
5.7 Developing security publications
5.7.1 Base Basic security publications
Many base security publications "Horizontal publication – Basic security publications" were
originally developed by government, consortia or specialist commercial organizations. Most of
these have been subsequently formalized into international or other generally accepted
technological standards. IEC committees should reference the public form of these standards
if one exists. The rules for referencing non ISO and IEC standards from within ISO and IEC
publications are specified in 10.2 of ISO/IEC Directives Part 2:20182021.
Within ISO/IEC joint technical committees, base security publications "Horizontal publication –
Basic security publications" defining security controls are prepared by ISO/IEC JTC 1/SC 27,
IT security techniques. Other IEC committees should not attempt to develop such generic basic
security controls as they are unlikely to have the necessary level of generic security expertise
and information. If an IEC committee identifies a need for a new publication of this type, it
should supply the relevant use case to JTC 1/SC 27 and request it to prepare an appropriate
publication.
It is left open to IEC committees to define security publications for their own domain to address
• relevant terminology,
• common threats and attacks,
• security design philosophy or such related issues, and
• common technical requirements (such as interoperability).
5.7.2 Horizontal publication – Group security publications
"Horizontal publication – Group security publications" will normally be domain-specific
publications.
Group security publications Horizontal publication – Basic security publications will normally be
developed within one IEC committee, but may have application in areas beyond the scope of
that committee. Normally, the domain committee will retain responsibility for publications
development and maintenance, but should take account of other known use cases and
requirements of wider use.
Group security publications Horizontal publication – Basic security publications should build
upon basic security services as defined in appropriate base security publications "Horizontal
publication – Basic security publications", but may be parameterized or configured to reflect the
intended field of application. This includes identifying specific threats, types of attack and
consequences that apply to the intended field of application.
IEC committees should not attempt to restrict the applicability of "Horizontal publication – Group
security publications" without good reason. This will enable developers of compliant products
and systems to offer them for use elsewhere. However, group security publications "Horizontal
publication – Basic security publications" should clearly identify any assumptions or limitations
concerning their applicability in order to minimize the potential for misuse.
Where necessary, IEC committees developing "Horizontal publication – Group security
publications" should consult or work collaboratively with the originators of the base basic
security publications that they reference.
5.7.3 Product security publications
Product security publications should normally be produced by the IEC committee that deals with
the aspects of that type of product or series of products. Product security publications will often
only deal with the product's interaction with its environment, referencing generic base or group
publications "Horizontal publication – Basic security publications" or "Horizontal publication –
Group security publications" to define internal behaviour.
5.7.4 Guidance security publications and test security publications
These publications should be produced by the IEC committee responsible for the base, group
"Horizontal publication – Basic security publications", "Horizontal publication – Group security
publications" or product security publication to which these publications refer. Assistance
should be sought from specialist committees dealing with conformity assessment if applicable.
Committees should consider whether it is more effective to deal with guidance and test aspects
of a publication through body text or annexes to the main specification, rather than by separate
publications or parts of publications. There are benefits and drawbacks in both approaches.
Committees referencing guidance publications or annexes should take care not to create
normative references to guidance information. In normative publications, references to
guidance information should appear in the bibliography.
6 Mapping and overview of publications
6.1 General
ACSEC has developed and maintains up to date a set of files for use by IEC committees, in
order to provide a global vision of the landscape of standardization in security.
These files are accessible from the Supporting Documents/Support Documents webpage from
section of the ACSEC dashboard on the IEC website [15].
ACSEC invites all IEC committees developing, revising or withdrawing publications involving
security aspects or requirements to notify ACSEC so that these files can be updated.
6.2 List of relevant publications
The list of publications provides useful information for each identified publication:
• committee;
• publication reference;
• publication title;
• security relevance;
• type of publication, see 5.3;
• application domain, see 5.4;
• content, see 5.5;
• user/ or target group, see 5.6;
• link to the IEC webstore.
This list will help publication writers in identifying existing publications, in order to avoid
duplication of work and favour consistency and coherence.
– 20 – IEC GUIDE 120:2023 RLV © IEC 2023
6.3 Domain table chart
Figure 2 illustrates the principle of the application-domain table chart, which indicates in which
application domains the p
...
IEC GUIDE 120 ®
Edition 2.0 2023-10
GUIDE
GUIDE
colour
inside
Security aspects – Guidelines for their inclusion in publications
Aspects liés à la sûreté – Lignes directrices pour les inclure dans les
publications
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.
Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite ni
utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie et
les microfilms, sans l'accord écrit de l'IEC ou du Comité national de l'IEC du pays du demandeur. Si vous avez des
questions sur le copyright de l'IEC ou si vous désirez obtenir des droits supplémentaires sur cette publication, utilisez
les coordonnées ci-après ou contactez le Comité national de l'IEC de votre pays de résidence.
IEC Secretariat Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.
About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigendum or an amendment might have been published.
IEC publications search - webstore.iec.ch/advsearchform IEC Products & Services Portal - products.iec.ch
The advanced search enables to find IEC publications by a Discover our powerful search engine and read freely all the
variety of criteria (reference number, text, technical publications previews. With a subscription you will always have
committee, …). It also gives information on projects, replaced access to up to date content tailored to your needs.
and withdrawn publications.
Electropedia - www.electropedia.org
IEC Just Published - webstore.iec.ch/justpublished
The world's leading online dictionary on electrotechnology,
Stay up to date on all new IEC publications. Just Published
containing more than 22 300 terminological entries in English
details all new publications released. Available online and once
and French, with equivalent terms in 19 additional languages.
a month by email.
Also known as the International Electrotechnical Vocabulary
(IEV) online.
IEC Customer Service Centre - webstore.iec.ch/csc
If you wish to give us your feedback on this publication or need
further assistance, please contact the Customer Service
Centre: sales@iec.ch.
A propos de l'IEC
La Commission Electrotechnique Internationale (IEC) est la première organisation mondiale qui élabore et publie des
Normes internationales pour tout ce qui a trait à l'électricité, à l'électronique et aux technologies apparentées.
A propos des publications IEC
Le contenu technique des publications IEC est constamment revu. Veuillez vous assurer que vous possédez l’édition la
plus récente, un corrigendum ou amendement peut avoir été publié.
Recherche de publications IEC - Découvrez notre puissant moteur de recherche et consultez
webstore.iec.ch/advsearchform gratuitement tous les aperçus des publications. Avec un
La recherche avancée permet de trouver des publications IEC abonnement, vous aurez toujours accès à un contenu à jour
en utilisant différents critères (numéro de référence, texte, adapté à vos besoins.
comité d’études, …). Elle donne aussi des informations sur les
projets et les publications remplacées ou retirées. Electropedia - www.electropedia.org
Le premier dictionnaire d'électrotechnologie en ligne au monde,
IEC Just Published - webstore.iec.ch/justpublished
avec plus de 22 300 articles terminologiques en anglais et en
Restez informé sur les nouvelles publications IEC. Just
français, ainsi que les termes équivalents dans 19 langues
Published détaille les nouvelles publications parues.
additionnelles. Egalement appelé Vocabulaire
Disponible en ligne et une fois par mois par email.
Electrotechnique International (IEV) en ligne.
Service Clients - webstore.iec.ch/csc
Si vous désirez nous donner des commentaires sur cette
publication ou si vous avez des questions contactez-nous:
sales@iec.ch.
IEC Products & Services Portal - products.iec.ch
IEC GUIDE 120 ®
Edition 2.0 2023-10
GUIDE
GUIDE
colour
inside
Security aspects – Guidelines for their inclusion in publications
Aspects liés à la sûreté – Lignes directrices pour les inclure dans les
publications
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
INTERNATIONALE
ICS 35.030 ISBN 978-2-8322-6434-8
– 2 – IEC GUIDE 120:2023 © IEC 2023
CONTENTS
FOREWORD . 4
INTRODUCTION . 6
1 Scope . 7
2 Normative references . 7
3 Terms and definitions . 7
4 Guide to terminology . 10
4.1 General . 10
4.2 Primary recommended sources . 10
4.3 Other relevant sources . 10
4.3.1 General . 10
4.3.2 Other application-domain independent sources. 10
4.3.3 Other application-domain specific sources . 11
5 Categorization of publications . 11
5.1 Overview. 11
5.2 Publication categories . 12
5.2.1 General . 12
5.2.2 Horizontal publication – Basic security publications (applicable to any
domain) . 12
5.2.3 Horizontal publication – Group security publications . 13
5.2.4 Product security publications . 13
5.3 Publication types . 13
5.3.1 General . 13
5.3.2 Guidance security publications . 13
5.3.3 Test methods security publications . 13
5.4 Application domain. 14
5.5 Content . 14
5.6 User or target group . 14
5.7 Developing security publications . 15
5.7.1 Basic security publications . 15
5.7.2 Horizontal publication – Group security publications . 15
5.7.3 Product security publications . 16
5.7.4 Guidance security publications and test security publications . 16
6 Mapping and overview of publications . 16
6.1 General . 16
6.2 List of relevant publications. 16
6.3 Domain table chart . 17
7 Considerations for publications development . 17
7.1 Practical considerations for publication writers . 17
7.2 Development process of security in publications . 17
7.3 Interrelation between functional safety and security . 20
7.4 Specific requirements . 21
7.4.1 Relationship with "Horizontal publication – Basic security publications" . 21
7.4.2 Consider conformity assessment when writing standards . 21
7.4.3 IEC Horizontal security functions and Group security functions . 22
7.4.4 Lifecycle approach . 22
7.4.5 Holistic system view . 23
7.4.6 Vulnerability handling . 23
7.4.7 Defence-in-depth . 23
7.4.8 Security management . 23
7.4.9 Supply chain . 24
7.4.10 Consider greenfield and brownfield . 24
7.4.11 Use of term integrity . 24
7.5 Security risk assessment . 24
7.5.1 General . 24
7.5.2 Iterative process of security risk assessment and risk mitigation . 25
7.5.3 Maintaining safe operation . 25
7.5.4 Scenario analysis . 26
7.5.5 Security risk mitigation strategy . 26
7.5.6 Validation . 27
Bibliography . 28
Figure 1 – Examples of publications according to different categorization classes . 12
Figure 2 – Publications and application domains . 17
Figure 3 – Example of security requirements, threats, and possible attacks . 18
Figure 4 – Decision flow chart . 19
Figure 5 – Interrelation between functional safety and security . 20
Figure 6 – Example of security management cycle for an organization . 22
Figure 7 – Selected measures for defence-in-depth strategy . 23
Figure 8 – Possible impact of security risk or risks on the safety-related control system . 26
Table 1 – Possible categorization of publications . 11
– 4 – IEC GUIDE 120:2023 © IEC 2023
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
SECURITY ASPECTS – GUIDELINES FOR
THEIR INCLUSION IN PUBLICATIONS
FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote international
co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and
in addition to other activities, IEC publishes International Standards, Technical Specifications, Technical Reports,
Publicly Available Specifications (PAS) and Guides (hereafter referred to as "IEC Publication(s)"). Their
preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with
may participate in this preparatory work. International, governmental and non-governmental organizations liaising
with the IEC also participate in this preparation. IEC collaborates closely with the International Organization for
Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence between
any IEC Publication and the corresponding national or regional publication shall be clearly indicated in the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of patent
rights. IEC shall not be held responsible for identifying any or all such patent rights.
This second edition of IEC Guide 120 has been prepared, in accordance with
ISO/IEC Directives, Part 1, Annex A, by the Advisory Committee on Information security and
data privacy (ACSEC).
This second edition cancels and replaces the first edition published in 2018.
The main changes with respect to the previous edition are as follows:
a) The terminology of IEC Guide 120 has been aligned with the terminology of
IEC Guide 108:2019.
The text of this Guide is based on the following documents:
Draft Report on voting
SMBNC/39/DV SMBNC/47/RV
Full information on the voting for the approval of this Guide can be found in the report on voting
indicated in the above table.
The language used for the development of this Guide is English.
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2, and
developed in accordance with ISO/IEC Directives, Part 1 and ISO/IEC Directives, IEC
Supplement, available at www.iec.ch/members_experts/refdocs. The main document types
developed by IEC are described in greater detail at www.iec.ch/standardsdev/publications.
IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates that it
contains colours which are considered to be useful for the correct understanding of its
contents. Users should therefore print this document using a colour printer.
– 6 – IEC GUIDE 120:2023 © IEC 2023
INTRODUCTION
The increasing complexity and connectivity of systems, products, processes and services
entering the market requires that the consideration of security aspects be given a high priority.
Inclusion of security aspects in standardization provides protection from and response to risks
of unintentionally and intentionally caused events that can disrupt the functionality and
operation of products and systems.
When preparing publications, committees should ensure that relevant resilience requirements
applicable to their application domain are included. Security aspects will in many cases play a
role in achieving resilience directed standards.
In this document, the term "committee", includes technical committees, subcommittees and
systems committees. The term "publication" includes "International Standard", "Technical
Report", "Technical Specification" and "Guide".
National legal and regulatory requirements can exist that impact the general application of
publications.
NOTE Publications can deal exclusively with security aspects or can include clauses specific to security.
SECURITY ASPECTS – GUIDELINES FOR
THEIR INCLUSION IN PUBLICATIONS
1 Scope
This document provides guidelines on the security aspects included in IEC publications, and
how to implement them. These guidelines can be used as a checklist for the combination of
publications used in implementation of systems.
This document includes what is often referred to as "cybersecurity".
This document excludes non-electrotechnical aspects of security such as societal security,
except where they directly interact with electrotechnical security.
NOTE The IEC Standardization Management Board (SMB) has decided that Guides such as this one can have
mandatory requirements which shall be followed by all IEC committees developing technical work that falls within the
scope of the Guide, as well as guidance which may or may not be followed. Any mandatory requirements in this
Guide are identified by the use of "shall". Statements that are only for guidance are identified by using the verb
"should". (See ISO/IEC Directives, IEC Supplement:2021, A.1.1.)
2 Normative references
There are no normative references in this document
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminology databases for use in standardization at the following
addresses:
• IEC Electropedia: available at https://www.electropedia.org/
• ISO Online browsing platform: available at https://www.iso.org/obp
3.1
accountability
property of a system (including all of its system resources) that ensures that the actions of a
system entity can be traced uniquely to that entity, which can be held responsible for its actions
[SOURCE: IEC TS 62443-1-1:2009, 3.2.3]
3.2
attack
attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make
unauthorized use of an asset
[SOURCE: ISO/IEC 27000:2018, 3.2]
3.3
authentication
provision of assurance that a claimed characteristic of an entity is correct
[SOURCE: ISO/IEC 27000:2018, 3.5]
– 8 – IEC GUIDE 120:2023 © IEC 2023
3.4
authorization
right or permission that is granted to a system entity to access a system resource
[SOURCE: IEC TS 62443-1-1:2009, 3.2.14]
3.5
availability
property of being accessible and usable upon demand by an authorized entity
[SOURCE: ISO/IEC 27000:2018, 3.7]
3.6
confidentiality
property that information is not made available or disclosed to unauthorized individuals, entities,
or processes
[SOURCE: ISO/IEC 24767-1:2008, 2.1.2]
3.7
functional safety
part of the overall safety that depends on functional and physical units operating correctly in
response to their inputs
[SOURCE: IEC 60050-351:2013, 351-57-06]
3.8
harm
injury or damage to the health of people, or damage to property or the environment
[SOURCE: ISO/IEC Guide 51:2014, 3.1]
3.9
integrity
property of accuracy and completeness
[SOURCE: ISO/IEC 27000:2018, 3.36]
3.10
non-repudiation
ability to prove the occurrence of a claimed event or action and its originating entities
[SOURCE: ISO/IEC 27000:2018, 3.48]
3.11
risk
combination of the probability of occurrence of harm and the severity of that harm
Note 1 to entry: The probability of security risks often cannot be determined in the same way as the probability of
safety hazards based on statistical analysis.
[SOURCE: IEC 60050-351:2013, 351-57-03, modified – Note 1 to entry has been added.]
3.12
safety
freedom from risk which is not tolerable
[SOURCE: ISO/IEC Guide 51:2014, 3.14]
3.13
security
condition that results from the establishment and maintenance of protective measures that
ensure a state of inviolability from hostile acts or influences
Note 1 to entry: Hostile acts or influences could be intentional or unintentional.
Note 2 to entry: In actual usage, "security" and "cybersecurity" are often used interchangeably, even if technically,
"cybersecurity" can be considered different from "security". However, this document does not make distinction
between these terms.
[SOURCE: IEC TS 62351-2:2008, 2.2.173, modified – Notes 1 and 2 to entry have been added.]
3.14
security control
measure which modifies security risk or use
Note 1 to entry: A security control can be a process, policy, device, practice or other action.
3.15
security service
mechanism used to provide confidentiality, data integrity, authentication, or non-repudiation of
information
[SOURCE: IEC TS 62443-1-1:2009, 3.2.115]
3.16
threat
potential for violation of security, which exists when there is a circumstance, capability, action,
or event that could breach security and cause harm
[SOURCE: IEC TS 62443-1-1:2009, 3.2.125]
3.17
vendor
manufacturer or distributor of a product
[SOURCE: IEC 62337:2012, 3.12, modified – In the definition, "piece of equipment/
instrument/package unit" has been replaced with "product".]
3.18
vulnerability
flaw or weakness in a system's design, implementation, or operation and management that
could be exploited to violate the system's security policy
Note 1 to entry: This definition of vulnerability should not be confused with the term vulnerability when used in the
context of general risk management, where it encompasses the notion of possibility of exposition to a risk.
[SOURCE: IEC TR 62918:2014, 3.16, modified – Note 1 to entry has been added.]
– 10 – IEC GUIDE 120:2023 © IEC 2023
4 Guide to terminology
4.1 General
There are already many security-related terms and definitions in existing publications.
Therefore, before defining a new term, existing terms and definitions should be checked first.
Primary recommended sources are shown in 4.2 and they should be used in preference to the
other relevant sources shown in 4.3. If no appropriate term and definition is found in those
sources, either modify an existing one or define a new one.
Definitions in this document are not intended to be generic ones but only apply to this document.
The ISO/IEC Directives Part 2:2021, Clause 16, defines how the terms and definitions in IEC
publications are drafted.
NOTE The same term can have different definitions depending on the context in which it is used, or different terms
can be used for the same or similar meaning in different application domains.
4.2 Primary recommended sources
The primary recommended sources are
a) IEC 60050 (all parts) (IEV) [1] ,
b) IEC Glossary [2], and
c) ISO/IEC JTC 1/SC 27 SD6 [3],
where IEC 60050 and the IEC Glossary should be used in preference.
IEC 60050 provides representative definitions to more than 20 000 terms, organized by subject
areas in IEC. The IEC Glossary is a compilation of electrotechnical terms extracted from the
"Terms and definitions" clause in existing IEC publications.
If no appropriate term or definition is found in the two sources above,
ISO/IEC JTC 1 SC 27 SD6, which covers more security-related terms and definitions, should
be consulted.
NOTE Application-domain specific terms developed by IEC committees are also considered to be primary sources.
These can be searched using the web page of the IEC Glossary.
4.3 Other relevant sources
4.3.1 General
There are a variety of resources available which focus on certain application domains of
electrotechnology such as energy, building, healthcare, and transportation.
This includes application-domain independent sources (4.3.2) and application-domain specific
sources (4.3.3).
4.3.2 Other application-domain independent sources
• IETF RFC 4949 [4];
• NISTIR 7298 [5];
• IEEE, Standards Glossary [6];
• ITU, ITU Terms and Definitions [7].
___________
Numbers in square brackets refer to the Bibliography.
4.3.3 Other application-domain specific sources
• Healthcare: HL7, Glossary Of Acronyms, Abbreviations and Terms Related To Information
Security In Healthcare Information Systems [8].
• Nuclear: IAEA, Nuclear Security Series Glossary [9].
• Energy: IEA, Glossary [10].
5 Categorization of publications
5.1 Overview
There are several different ways in which security publications can be categorized. Five
possible classes for the categorization are considered as shown in Table 1:
• Publication categories;
• Publication types;
• Application domain;
• Content;
• User or target group;
Publications can belong to more than one class.
This document provides complementary information to IEC Guide 108 when referring to
horizontal security publications.
Table 1 – Possible categorization of publications
Publication categories Horizontal publication – Basic security publications (applicable to any domain)
Horizontal publication – Group security publications (applicable to one or several
specified domains)
Product security publications
Publication types Guidance security publications (which could be horizontal publications or not)
Test methods security publications (which could be horizontal publications or not)
Configuration
Application domain • Building
• Energy
• General
• Healthcare
• ICT
• Industrial automation
• Transportation
Content • Component
• Management
• Policy
• Process
• Subsystem
• System
• Technology
User or target group • Auditor
• Integrator
• Operator
• Maintainer
• Regulator
• Vendor
– 12 – IEC GUIDE 120:2023 © IEC 2023
Figure 1 shows some examples of security publications listed according to the proposed
classes.
NOTE The examples listed in Figure 1 are not exhaustive.
Figure 1 – Examples of publications according to different categorization classes
5.2 Publication categories
5.2.1 General
"Publication categories" stems from IEC Guide 108:2019 and extends the definition of the
different categories proposed for horizontal publications to fully consider the security aspect
context. The publication categories considered in this document are:
• Horizontal publication – Basic security publications (applicable to any domain);
• Horizontal publication – Group security publications;
• Product security publications.
5.2.2 Horizontal publication – Basic security publications (applicable to any domain)
"Horizontal publication – Basic security publications" deal with fundamental concepts, principles
and requirements with regard to general security aspects applicable to a wide range of products
and systems, and are applicable to any domain.
5.2.3 Horizontal publication – Group security publications
"Horizontal publication – Group security publications" show how to apply security in one of the
application domains. To do this, they may reference or customize existing "Horizontal
publication – Basic security publications".
"Horizontal publication – Group security publications" may be applicable to many products or
systems, or families of similar products or systems.
"Horizontal publication – Group security publications" can be referred to as sector-specific
security publications.
5.2.4 Product security publications
"Product security publications" define how to apply "Horizontal publication – Basic security
publications" or "Horizontal publication – Group security publications" for a particular type of
product. They ensure that different products can interact or interoperate securely, and can be
controlled and managed in a uniform manner.
"Product security publications" should as far as possible define their requirements by reference
to "Horizontal publication – Basic security publications" or "Horizontal publication – Group
security publications".
NOTE In this context, the term "product" includes items such as process, service, installation, and combinations
thereof.
5.3 Publication types
5.3.1 General
"Publication types" stems from IEC Guide 108:2019 and extends the definition of the different
types proposed for horizontal publications to fully consider the security aspect context. The
proposed types considered in this document are:
• Guidance security publications;
• Test methods security publications.
5.3.2 Guidance security publications
"Guidance security publications" should not contain requirements. They explain how to
implement "Horizontal publication – Basic security publications", "Horizontal publication –
Group security publications" or product security publications.
In some application areas, guidance security publications are not used. Instead, necessary
guidance information is provided through informative annexes within the relevant requirements
standard.
5.3.3 Test methods security publications
"Test methods security publications" define ways to determine that the requirements of
"Horizontal publication – Basic security publications", and "Horizontal publication – Group
security publications" or product security publications have been correctly implemented.
Test methods security publications typically have a specialized audience and often make
reference to conformity assessment. They may define or identify reference implementations
that can be used to determine correct implementation through successful interoperation.
– 14 – IEC GUIDE 120:2023 © IEC 2023
5.4 Application domain
Publications for security can also be categorized according to their intended domain of
application. This can be a sector of economic or industrial activity, a type of market, or an area
of application.
Some examples of application domains are listed below, as shown in Figure 1:
• building;
• energy;
• general;
• healthcare;
• ICT;
• industrial automation;
• transportation.
In many cases an application domain will have an associated IEC committee responsible for
the development of publications for that domain. This committee should accept responsibility
for the development of the associated security publications.
Such committees will normally be able to define relevant threat models and security use cases
independently, but it is possible that they will need to seek advice from the committees
responsible for "Horizontal publication – Basic security publications" in configuring or
customizing those basic security publications when referenced.
5.5 Content
Publications for security can also be grouped by their type of content.
Some examples of possible groups are listed below, as shown in Figure 1:
• component;
• management;
• policy (not in IEC);
• process;
• subsystem;
• system;
• technology.
For example, electrotechnical standards for information security management include the
"Horizontal publication – Basic security publications" standard ISO/IEC 27001 [11] (developed
by ISO/IEC JTC 1/SC 27), but also the sector-specific standards ISO/IEC 27019 [12]
(developed by ISO/IEC JTC 1/SC 27), IEC 62443-2-1 [13] (developed by IEC TC 65) and
IEC 62645 [14] (developed by IEC SC 45A).
5.6 User or target group
Publications for security can also be grouped by their intended audience. Some examples of
possible user groups are listed below, as shown in Figure 1:
• auditor;
• integrator;
• operator;
• maintainer;
• regulator;
• vendor.
5.7 Developing security publications
5.7.1 Basic security publications
Many "Horizontal publication – Basic security publications" were originally developed by
government, consortia or specialist commercial organizations. Most of these have been
subsequently formalized into international or other generally accepted technological standards.
IEC committees should reference the public form of these standards if one exists. The rules for
referencing non ISO and IEC standards from within ISO and IEC publications are specified in
10.2 of ISO/IEC Directives Part 2:2021.
Within ISO/IEC joint technical committees, "Horizontal publication – Basic security publications"
defining security controls are prepared by ISO/IEC JTC 1/SC 27. Other IEC committees should
not attempt to develop such basic security controls as they are unlikely to have the necessary
level of generic security expertise and information. If an IEC committee identifies a need for a
new publication of this type, it should supply the relevant use case to JTC 1/SC 27 and request
it to prepare an appropriate publication.
It is left open to IEC committees to define security publications for their own domain to address
• relevant terminology,
• common threats and attacks,
• security design philosophy or such related issues, and
• common technical requirements (such as interoperability).
5.7.2 Horizontal publication – Group security publications
"Horizontal publication – Group security publications" will normally be domain-specific
publications.
Horizontal publication – Basic security publications will normally be developed within one IEC
committee, but may have application in areas beyond the scope of that committee. Normally,
the domain committee will retain responsibility for publications development and maintenance,
but should take account of other known use cases and requirements of wider use.
Horizontal publication – Basic security publications should build upon basic security services
as defined in appropriate "Horizontal publication – Basic security publications", but may be
parameterized or configured to reflect the intended field of application. This includes identifying
specific threats, types of attack and consequences that apply to the intended field of application.
IEC committees should not attempt to restrict the applicability of "Horizontal publication – Group
security publications" without good reason. This will enable developers of compliant products
and systems to offer them for use elsewhere. However, "Horizontal publication – Basic security
publications" should clearly identify any assumptions or limitations concerning their applicability
in order to minimize the potential for misuse.
Where necessary, IEC committees developing "Horizontal publication – Group security
publications" should consult or work collaboratively with the originators of the basic security
publications that they reference.
– 16 – IEC GUIDE 120:2023 © IEC 2023
5.7.3 Product security publications
Product security publications should normally be produced by the IEC committee that deals with
the aspects of that type of product or series of products. Product security publications will often
only deal with the product's interaction with its environment, referencing "Horizontal
publication – Basic security publications" or "Horizontal publication – Group security
publications" to define internal behaviour.
5.7.4 Guidance security publications and test security publications
These publications should be produced by the IEC committee responsible for "Horizontal
publication – Basic security publications", "Horizontal publication – Group security publications"
or product security publication to which these publications refer. Assistance should be sought
from specialist committees dealing with conformity assessment if applicable.
Committees should consider whether it is more effective to deal with guidance and test aspects
of a publication through body text or annexes to the main specification, rather than by separate
publications or parts of publications. There are benefits and drawbacks in both approaches.
Committees referencing guidance publications or annexes should take care not to create
normative references to guidance information. In normative publications, references to
guidance information should appear in the bibliography.
6 Mapping and overview of publications
6.1 General
ACSEC has developed and maintains up to date a set of files for use by IEC committees, in
order to provide a global vision of the landscape of standardization in security.
These files are accessible from the Supporting Documents section of the ACSEC dashboard on
the IEC website [15].
ACSEC invites all IEC committees developing, revising or withdrawing publications involving
security aspects or requirements to notify ACSEC so that these files can be updated.
6.2 List of relevant publications
The list of publications provides useful information for each identified publication:
• committee;
• publication reference;
• publication title;
• security relevance;
• type of publication, see 5.3;
• application domain, see 5.4;
• content, see 5.5;
• user or target group, see 5.6;
• link to the IEC webstore.
This list will help publication writers in identifying existing publications, in order to avoid
duplication of work and favour consistency and coherence.
6.3 Domain table chart
Figure 2 illustrates the principle of the application-domain table chart, which indicates in which
application domains the publications produced by a body are applied or will be applied in the
future. This will help publication users to identify committees or publications or both which could
play a role in the dedicated application domain.
IEC TC X a a m
IEC TC Y a m a a a d a a
IEC TC Z a m d
Key
m main domain: primary area of application for the publications of the committee.
a further application: secondary areas of application for the publications of the committee.
d under development: potential future areas of application for the publications of the committee.
Figure 2 – Publications and application domains
7 Considerations for publications development
7.1 Practical considerations for publication writers
IEC publications should be clear, concise, consistent and complete, and should be written in
line with ISO/IEC Directives, Part 2. Publication writers should have in mind that security of
systems relies on security risk assessment and management. Therefore, security
considerations in publications should sometimes be formulated as recommendations to allow
the applicability of the security considerations to different systems belonging to the scope of
the publication. For example, interoperability between systems can require that product security
publications specify requirements instead of recommendations.
Moreover, security considerations in publications should not specify any particular or
commercial solution to address requirements, but should adopt a generic approach to provide
security recommendations.
Where appropriate, security considerations should be included in specific clauses in the IEC
publication.
Security research and technology is developing rapidly; as a result, any publication should be
reviewed on a regular basis to ensure that it is current with technology and threat landscape.
7.2 Development process of security in publications
Figure 3 gives an example of the relationships between security requirements, threats, and
attacks.
Building automation
Energy
Healthcare
Home automation
ICT
Industrial automation
Nuclear
Transportation
– 18 – IEC GUIDE 120:2023 © IEC 2023
SOURCE: IEC TS 62351-1:2007, Figure 1.
Figure 3 – Example of security requirements, threats, and possible attacks
Security issues should be considered from the start of the publication development process. It
should be checked whether security is to be considered (see Figure 4) in terms of mandatory
requirements or recommendations.
Security considerations (including acceptable risk if appropriate) should be addressed by a risk
based approach (see, for example, ISO 31000 [16] as a generic approach, and
ISO/IEC 27005 [17] as a common IT security approach).
NOTE Risk based approach does not imply risk assessment.
If security aspects to be addressed in the publication have been identified, it should be
determined whether existing publications can be referenced (see 6.2). If no suitable publication
exists, the identified security provisions should be developed.
Figure 4 – Decision flow chart
The guidelines listed below elaborate the flow chart and provide further recommendation
...
IEC GUIDE 120:2023는 보안 측면에 대한 지침을 제공하며, IEC 출판물에 포함될 보안 요소들을 체계적으로 이해하고 구현하는 데 필요한 명확한 로드맵을 제시합니다. 이 표준은 시스템 구현에 사용되는 출판물의 조합을 위한 체크리스트로 활용될 수 있어, 실용적인 접근 방식을 제공합니다. 이 문서는 자주 "사이버 보안"으로 언급되는 내용을 포함하고 있으며, 이는 현대 전자 기술 환경에서 필수적인 요소입니다. IEC GUIDE 120:2023은 전자 기술 보안과 직접 상호작용하지 않는 사회적 보안과 같은 비전기적인 보안 측면은 제외하고 집중적으로 다루고 있어, 전기 기술 분야의 전문성이 더욱 강조됩니다. 이 표준의 강점은 명확한 가이드라인을 통해 모든 관련 출판물에서 보안 요소를 통합할 수 있도록 도와준다는 점입니다. 보안의 범위가 명료하게 정의되어 있어, 전자 기기 및 시스템의 보안을 강화하는 데 기여합니다. 또한, 이 문서는 전 세계적으로 통용될 수 있는 국제적인 기준을 마련하여, 다양한 분야에서 보안을 효과적으로 실행할 수 있도록 지원합니다. IEC GUIDE 120:2023의 현재성과 관련성은 급격히 변화하는 기술 환경과 사이버 위협의 증가에 대해 적절한 대응을 요구합니다. 이 표준이 제공하는 조언과 지침은 실제 응용 분야에서 보안 문제를 사전에 예방하는 데 유용하며, 제작자와 사용자가 모두 신뢰할 수 있는 기반을 제공하는 데 기여할 것입니다.
IEC GUIDE 120:2023 offers a comprehensive framework that addresses the critical security aspects necessary for inclusion in IEC publications, effectively responding to the growing demands of cybersecurity within electrotechnical sectors. The standard delineates clear guidelines, serving as a practical checklist for organizations aiming to integrate security measures into their systems. One of the notable strengths of IEC GUIDE 120:2023 is its focused approach on cybersecurity, which recognizes the intersection of digital threats with electrotechnical applications. This specificity allows users to tailor their security protocols directly to the nuances of electrotechnical projects, ensuring that relevant cybersecurity elements are not only acknowledged but thoroughly incorporated. Moreover, the document's exclusion of non-electrotechnical security aspects, such as societal security, provides clarity and keeps the focus squarely on pertinent security issues. This clear scope enhances the document's usability, allowing stakeholders to efficiently identify best practices and necessary protocols that directly affect the security of their systems. Additionally, the guidelines are structured to promote coherent implementation across various IEC publications. This harmonization is particularly valuable for organizations that utilize multiple documents in their systems integration, facilitating a seamless incorporation of security measures into broader project frameworks. In summary, IEC GUIDE 120:2023 stands out for its targeted focus on cybersecurity within the electrotechnical domain, providing essential guidelines for organizations looking to fortify their systems while enhancing their adherence to established security protocols. The document serves as a vital resource, reinforcing the critical importance of systematic security measures in today’s technology-driven landscape.
IEC GUIDE 120:2023 표준은 보안 측면의 포함에 대한 지침을 제공하는 중요한 문서로, IEC 출판물에서 보안 과제를 어떻게 구현할 것인지에 대한 명확한 방향을 제시합니다. 이 표준의 범위는 시스템 구현에 사용되는 출판물의 조합을 위한 체크리스트로 기능할 수 있는 사항들을 명시하고 있습니다. 특히, "사이버 보안"으로 자주 언급되는 내용을 포함하며, 이는 현대 전자 기술 환경에서 필수적인 요소로 자리 잡고 있습니다. IEC GUIDE 120:2023의 강점은 보안 과제를 문서화하고 시스템 접근 방식으로 통합할 수 있는 체계적이고 실용적인 지침을 제공한다는 점입니다. 이 문서는 기술적인 보안뿐만 아니라, 전자 기술 보안과 직접 상호작용하는 비기술적인 보안 요소를 제외하는 데에서 그 명확성을 유지하고 있어, 사용자들이 효과적으로 보안 문제를 구현하고 관리할 수 있도록 돕습니다. 현재의 디지털 환경에서 사이버 보안의 중요성은 갈수록 커지고 있으며, IEC GUIDE 120:2023이 제시하는 지침들은 다양한 분야의 전문가들이 보안을 고려하며 작업할 수 있는 기초를 마련해 줍니다. 이 표준은 IEC 출판물에 포함된 보안 측면을 조직화하고, 일관성 있게 적용되는 방법을 제시함으로써 전체 시스템의 신뢰성과 보안을 강화하는 데 중요한 역할을 합니다. 이렇듯 IEC GUIDE 120:2023은 전자 기술 보안과 사이버 보안의 중요성을 강조하며, 이를 효과적으로 통합할 수 있도록 지원하는 매우 중요한 표준입니다. 따라서, 전자 기술 분야의 종사자들에게 이 표준은 지속적으로 유용할 것이며, 보안 측면을 고려한 보다 안전한 시스템 구축을 도울 것입니다.
IEC GUIDE 120:2023は、IEC出版物におけるセキュリティ面のガイドラインを提供しており、その実装方法についても説明しています。この標準は、システム実装における出版物の組み合わせに関するチェックリストとして活用できるため、非常に実用的です。 この文書の強みは、特に「サイバーセキュリティ」として一般に知られる側面に焦点を当てている点です。これは、現代の技術的環境においてますます重要になっているため、IEC GUIDE 120:2023の関連性を高めています。また、電気技術的なセキュリティと直接的に相互作用する社会的セキュリティなどの非電気技術的側面を除外することにより、内容が明確に定義されていることも特筆すべき点です。 この標準のスコープは、IEC出版物の一貫したセキュリティアプローチを確立する手助けとなり、技術者が適切な基準に基づいて作業を進めることができるようにします。そのため、IEC GUIDE 120:2023は、電気技術業界の専門家にとって必要不可欠な資料となるでしょう。
IEC GUIDE 120:2023は、電気技術文書に含まれるセキュリティの側面に関するガイドラインを提供しており、実装時に考慮すべき重要なポイントを網羅しています。この標準は、システム実装時に使用される文書の組み合わせに関するチェックリストとして利用でき、特にサイバーセキュリティに焦点を当てています。サイバーセキュリティは、現代の技術環境において不可欠な要素であり、このガイドラインはその導入を助けるために設計されています。 IEC GUIDE 120:2023の強みの一つは、その具体的かつ実践的なアプローチにあります。セキュリティ要件を明確に定義し、文書の作成者が実際に取り組むべき事項を理解しやすく示すことで、実用性が高まります。これにより、ユーザーや開発者がサイバーセキュリティの側面を適切に考慮し、統合するための手助けとなります。 さらに、この標準は電気技術的なセキュリティに直接関連する側面に限定しており、社会的セキュリティなどの非電気技術的要素は除外されています。これにより、ユーザーはより焦点を絞った情報を得ることができ、電気技術分野におけるセキュリティへの理解を深めることができます。この特化したアプローチは、関連性を高め、セキュリティがどのように電気技術に組み込まれるべきかを明確に示しています。 全体として、IEC GUIDE 120:2023は、サイバーセキュリティを含むセキュリティ側面が大変重要である現代の状況を考慮し、関連性の高いガイドラインを提供します。この標準は、業界標準に沿ったセキュリティ対策を講じる上での基本的な指針となり、実装の際には欠かせない資料です。
IEC GUIDE 120:2023 presents comprehensive guidelines regarding the integration of security aspects into IEC publications, marking its significance in the realm of cybersecurity. The document provides a clear framework for establishing security measures within electrotechnical systems, which is increasingly critical in today's technology-driven environment. One of the key strengths of IEC GUIDE 120:2023 is its dual-purpose utility as both a guideline and a checklist. This structured approach facilitates organizations in effectively implementing security measures within a variety of publications. By ensuring that all relevant security considerations are addressed, the standard helps in minimizing vulnerabilities and strengthens the overall security posture of electrotechnical systems. The relevance of this standard cannot be overstated, especially as organizations increasingly face sophisticated cybersecurity threats. By outlining the necessary steps for incorporating security considerations in publications, IEC GUIDE 120:2023 empowers stakeholders to proactively combat potential security breaches. The exclusion of non-electrotechnical security aspects maintains a focused approach, ensuring that the guidelines effectively meet the requirements of electrotechnical security without diluting their applicability with broader security concerns. In summary, IEC GUIDE 120:2023 serves as an essential resource for organizations striving to enhance their cybersecurity measures within electrotechnical realms, ensuring effective implementation and ultimately promoting a secure operational environment.














Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...