CLC/TC 65X/WG 03 - Cyber Security
Provisional scope: - Observing the Cyber Security activities on IEC, ISO and other standardization bodies and fora - Being the TC 65X contact for the CEN/CLC JTC13
Cyber Security
Provisional scope: - Observing the Cyber Security activities on IEC, ISO and other standardization bodies and fora - Being the TC 65X contact for the CEN/CLC JTC13
General Information
This document specifies the evaluation methodology to support achieving repeatable and reproducible evaluation results for IACS components under evaluation against IEC 62443-4-2 requirements. This document does not specify the definition of a complete certification scheme or certification program. This document does not specify the process evaluations of the secure development lifecycle according to IEC 62443-4-1. The existing secure development lifecycle according to IEC 62443-4-1 is a prerequisite in this evaluation methodology. This document does not specify particular tools, e.g. for the use in vulnerability or penetration testing. This document does not focus on lACS components which were not developed according to the lifecycle process of IEC 62443-4-1.
- Technical specification65 pagesEnglish languagee-Library read for1 day
This part of IEC 62443 specifies the evaluation methodology to support interested parties (e.g. during conformity assessment activities) to achieve repeatable and reproducible evaluation results against IEC 62443-2-4 requirements. This document is intended for first-party, secondparty or third-party conformity assessment activity, for example by product suppliers, service providers, asset owners and conformity assessment bodies. NOTE 1 62443-2-4 specifies requirements for security capabilities of an IACS service provider. These security capabilities can be offered as a security program during integration and maintenance of an automation solution. NOTE 2 The term “conformity assessment” and the terms first-party conformity assessment activity, second-party conformity assessment activity and third-party conformity assessment activity are defined in ISO/IEC 17000.
- Technical specification135 pagesEnglish languagee-Library read for1 day
This part of IEC 62443 specifies a scheme for defining (selecting, writing, drafting, creating) IEC 62443 security profiles. This scheme and its specified requirements apply to IEC 62443 security profiles which are planned to be published as part of the upcoming IEC 62443 dedicated security profiles subseries. IEC 62443 security profiles can support interested parties (e.g. during conformity assessment activities) to achieve comparability of assessed IEC 62443 requirements.
- Technical specification18 pagesEnglish languagee-Library read for1 day
This document specifies process requirements for the secure development of products used in industrial automation and control systems. It defines a secure development life-cycle (SDL) for the purpose of developing and maintaining secure products. This life-cycle includes security requirements definition, secure design, secure implementation (including coding guidelines), verification and validation, defect management, patch management and product end-of-life. These requirements can be applied to new or existing processes for developing, maintaining and retiring hardware, software or firmware for new or existing products. These requirements apply to the developer and maintainer of the product, but not to the integrator or user of the product. A summary list of the requirements in this document can be found in Annex B.
- Draft80 pagesEnglish languagee-Library read for1 day
This document provides detailed technical control system component requirements (CRs) associated with seven foundational requirements (FRs) including defining the requirements for control system capability security levels and their components, SL-C(component). The seven foundational requirements (FRs) are: a) identification and authentication control (IAC), b) use control (UC), c) system integrity (SI), d) data confidentiality (DC), e) restricted data flow (RDF), f) timely response to events (TRE), and g) resource availability (RA).
- Draft193 pagesEnglish languagee-Library read for1 day
Frequently Asked Questions
CLC/TC 65X/WG 03 is a Working Group within CLC. It is named "Cyber Security" and is responsible for: Provisional scope: - Observing the Cyber Security activities on IEC, ISO and other standardization bodies and fora - Being the TC 65X contact for the CEN/CLC JTC13 This committee has published 5 standards.
CLC/TC 65X/WG 03 develops CLC standards in the area of Information technology. The scope of work includes: Provisional scope: - Observing the Cyber Security activities on IEC, ISO and other standardization bodies and fora - Being the TC 65X contact for the CEN/CLC JTC13 Currently, there are 5 published standards from this working group.
CLC is a standardization organization that develops and publishes standards to support industry, commerce, and regulatory requirements.
A Working Group in CLC is a specialized group responsible for developing standards or technical work within a defined scope. These bodies bring together international experts to create consensus-based standards that support global trade, safety, and interoperability.