Shopping Cart

No products in the cart.

BS EN IEC 62443-3-3:2019

$215.11

Industrial communication networks. Network and system security – System security requirements and security levels

Published By Publication Date Number of Pages
BSI 2019 86
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weโ€™re here to assist you 24/7.
Email:[email protected]

This part of the IEC 62443 series provides detailed technical control system requirements (SRs) associated with the seven foundational requirements (FRs) described in IEC 62443โ€‘1โ€‘1 including defining the requirements for control system capability security levels, SL-C(control system). These requirements would be used by various members of the industrial automation and control system (IACS) community along with the defined zones and conduits for the system under consideration (SuC) while developing the appropriate control system target SL, SL-T(control system), for a specific asset.

As defined in IEC 62443โ€‘1โ€‘1 there are a total of seven FRs:

  1. Identification and authentication control (IAC),

  2. Use control (UC),

  3. System integrity (SI),

  4. Data confidentiality (DC),

  5. Restricted data flow (RDF),

  6. Timely response to events (TRE), and

  7. Resource availability (RA).

These seven requirements are the foundation for control system capability SLs, SL-C (control system). Defining security capability at the control system level is the goal and objective of this standard as opposed to target SLs, SL-T, or achieved SLs, SL-A, which are out of scope.

See IEC 62443โ€‘2โ€‘1 for an equivalent set of non-technical, program-related, capability SRs necessary for fully achieving a control system target SL.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 Annex ZA(normative)Normative references to international publicationswith their corresponding European publications
7 CONTENTS
14 FOREWORD
16 0 Introduction
0.1 Overview
17 0.2 Purpose and intended audience
0.3 Usage within other parts of the IEC 62443 series
18 Figures
Figure 1 โ€“ Structure of the IEC 62443 series
19 1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms, acronyms, and conventions
3.1 Terms and definitions
25 3.2 Abbreviated terms and acronyms
27 3.3 Conventions
4 Common control system security constraints
4.1 Overview
28 4.2 Support of essential functions
4.3 Compensating countermeasures
29 4.4 Least privilege
5 FR 1 โ€“ Identification and authentication control
5.1 Purpose and SL-C(IAC) descriptions
5.2 Rationale
5.3 SR 1.1 โ€“ Human user identification and authentication
5.3.1 Requirement
5.3.2 Rationale and supplemental guidance
30 5.3.3 Requirement enhancements
5.3.4 Security levels
31 5.4 SR 1.2 โ€“ Software process and device identification and authentication
5.4.1 Requirement
5.4.2 Rationale and supplemental guidance
5.4.3 Requirement enhancements
32 5.4.4 Security levels
5.5 SR 1.3 โ€“ Account management
5.5.1 Requirement
5.5.2 Rationale and supplemental guidance
5.5.3 Requirement enhancements
5.5.4 Security levels
33 5.6 SR 1.4 โ€“ Identifier management
5.6.1 Requirement
5.6.2 Rationale and supplemental guidance
5.6.3 Requirement enhancements
5.6.4 Security levels
5.7 SR 1.5 โ€“ Authenticator management
5.7.1 Requirement
5.7.2 Rationale and supplemental guidance
34 5.7.3 Requirement enhancements
5.7.4 Security levels
35 5.8 SR 1.6 โ€“ Wireless access management
5.8.1 Requirement
5.8.2 Rationale and supplemental guidance
5.8.3 Requirement enhancements
5.8.4 Security levels
5.9 SR 1.7 โ€“ Strength of password-based authentication
5.9.1 Requirement
5.9.2 Rationale and supplemental guidance
36 5.9.3 Requirement enhancements
5.9.4 Security levels
5.10 SR 1.8 โ€“ Public key infrastructure (PKI) certificates
5.10.1 Requirement
5.10.2 Rationale and supplemental guidance
37 5.10.3 Requirement enhancements
5.10.4 Security levels
5.11 SR 1.9 โ€“ Strength of public key authentication
5.11.1 Requirement
5.11.2 Rationale and supplemental guidance
38 5.11.3 Requirement enhancements
5.11.4 Security levels
5.12 SR 1.10 โ€“ Authenticator feedback
5.12.1 Requirement
5.12.2 Rationale and supplemental guidance
5.12.3 Requirement enhancements
5.12.4 Security levels
39 5.13 SR 1.11 โ€“ Unsuccessful login attempts
5.13.1 Requirement
5.13.2 Rationale and supplemental guidance
5.13.3 Requirement enhancements
5.13.4 Security levels
5.14 SR 1.12 โ€“ System use notification
5.14.1 Requirement
5.14.2 Rationale and supplemental guidance
40 5.14.3 Requirement enhancements
5.14.4 Security levels
5.15 SR 1.13 โ€“ Access via untrusted networks
5.15.1 Requirement
5.15.2 Rationale and supplemental guidance
5.15.3 Requirement enhancements
5.15.4 Security levels
41 6 FR 2 โ€“ Use control
6.1 Purpose and SL-C(UC) descriptions
6.2 Rationale
6.3 SR 2.1 โ€“ Authorization enforcement
6.3.1 Requirement
6.3.2 Rationale and supplemental guidance
42 6.3.3 Requirement enhancements
6.3.4 Security levels
6.4 SR 2.2 โ€“ Wireless use control
6.4.1 Requirement
43 6.4.2 Rationale and supplemental guidance
6.4.3 Requirement enhancements
6.4.4 Security levels
6.5 SR 2.3 โ€“ Use control for portable and mobile devices
6.5.1 Requirement
6.5.2 Rationale and supplemental guidance
44 6.5.3 Requirement enhancements
6.5.4 Security levels
6.6 SR 2.4 โ€“ Mobile code
6.6.1 Requirement
6.6.2 Rationale and supplemental guidance
6.6.3 Requirement enhancements
6.6.4 Security levels
45 6.7 SR 2.5 โ€“ Session lock
6.7.1 Requirement
6.7.2 Rationale and supplemental guidance
6.7.3 Requirement enhancements
6.7.4 Security levels
6.8 SR 2.6 โ€“ Remote session termination
6.8.1 Requirement
6.8.2 Rationale and supplemental guidance
6.8.3 Requirement enhancements
46 6.8.4 Security levels
6.9 SR 2.7 โ€“ Concurrent session control
6.9.1 Requirement
6.9.2 Rationale and supplemental guidance
6.9.3 Requirement enhancements
6.9.4 Security levels
6.10 SR 2.8 โ€“ Auditable events
6.10.1 Requirement
6.10.2 Rationale and supplemental guidance
47 6.10.3 Requirement enhancements
6.10.4 Security levels
6.11 SR 2.9 โ€“ Audit storage capacity
6.11.1 Requirement
6.11.2 Rationale and supplemental guidance
6.11.3 Requirement enhancements
48 6.11.4 Security levels
6.12 SR 2.10 โ€“ Response to audit processing failures
6.12.1 Requirement
6.12.2 Rationale and supplemental guidance
6.12.3 Requirement enhancements
6.12.4 Security levels
6.13 SR 2.11 โ€“ Timestamps
6.13.1 Requirement
6.13.2 Rationale and supplemental guidance
49 6.13.3 Requirement enhancements
6.13.4 Security levels
6.14 SR 2.12 โ€“ Non-repudiation
6.14.1 Requirement
6.14.2 Rationale and supplemental guidance
6.14.3 Requirement enhancements
6.14.4 Security levels
50 7 FR 3 โ€“ System integrity
7.1 Purpose and SL-C(SI) descriptions
7.2 Rationale
7.3 SR 3.1 โ€“ Communication integrity
7.3.1 Requirement
7.3.2 Rationale and supplemental guidance
51 7.3.3 Requirement enhancements
7.3.4 Security levels
7.4 SR 3.2 โ€“ Malicious code protection
7.4.1 Requirement
7.4.2 Rationale and supplemental guidance
52 7.4.3 Requirement enhancements
7.4.4 Security levels
7.5 SR 3.3 โ€“ Security functionality verification
7.5.1 Requirement
7.5.2 Rationale and supplemental guidance
53 7.5.3 Requirement enhancements
7.5.4 Security levels
7.6 SR 3.4 โ€“ Software and information integrity
7.6.1 Requirement
7.6.2 Rationale and supplemental guidance
54 7.6.3 Requirement enhancements
7.6.4 Security levels
7.7 SR 3.5 โ€“ Input validation
7.7.1 Requirement
7.7.2 Rationale and supplemental guidance
7.7.3 Requirement enhancements
7.7.4 Security levels
55 7.8 SR 3.6 โ€“ Deterministic output
7.8.1 Requirement
7.8.2 Rationale and supplemental guidance
7.8.3 Requirement enhancements
7.8.4 Security levels
7.9 SR 3.7 โ€“ Error handling
7.9.1 Requirement
7.9.2 Rationale and supplemental guidance
7.9.3 Requirement enhancements
56 7.9.4 Security levels
7.10 SR 3.8 โ€“ Session integrity
7.10.1 Requirement
7.10.2 Rationale and supplemental guidance
7.10.3 Requirement enhancements
7.10.4 Security levels
57 7.11 SR 3.9 โ€“ Protection of audit information
7.11.1 Requirement
7.11.2 Rationale and supplemental guidance
7.11.3 Requirement enhancements
7.11.4 Security levels
8 FR 4 โ€“ Data confidentiality
8.1 Purpose and SL-C(DC) descriptions
8.2 Rationale
58 8.3 SR 4.1 โ€“ Information confidentiality
8.3.1 Requirement
8.3.2 Rationale and supplemental guidance
8.3.3 Requirement enhancements
8.3.4 Security levels
59 8.4 SR 4.2 โ€“ Information persistence
8.4.1 Requirement
8.4.2 Rationale and supplemental guidance
8.4.3 Requirement enhancements
8.4.4 Security levels
8.5 SR 4.3 โ€“ Use of cryptography
8.5.1 Requirement
60 8.5.2 Rationale and supplemental guidance
8.5.3 Requirement enhancements
8.5.4 Security levels
9 FR 5 โ€“ Restricted data flow
9.1 Purpose and SL-C(RDF) descriptions
9.2 Rationale
61 9.3 SR 5.1 โ€“ Network segmentation
9.3.1 Requirement
9.3.2 Rationale and supplemental guidance
9.3.3 Requirement enhancements
62 9.3.4 Security levels
9.4 SR 5.2 โ€“ Zone boundary protection
9.4.1 Requirement
9.4.2 Rationale and supplemental guidance
9.4.3 Requirement enhancements
63 9.4.4 Security levels
9.5 SR 5.3 โ€“ General purpose person-to-person communication restrictions
9.5.1 Requirement
9.5.2 Rationale and supplemental guidance
9.5.3 Requirement enhancements
64 9.5.4 Security levels
9.6 SR 5.4 โ€“ Application partitioning
9.6.1 Requirement
9.6.2 Rationale and supplemental guidance
9.6.3 Requirement enhancements
9.6.4 Security levels
10 FR 6 โ€“ Timely response to events
10.1 Purpose and SL-C(TRE) descriptions
65 10.2 Rationale
10.3 SR 6.1 โ€“ Audit log accessibility
10.3.1 Requirement
10.3.2 Rationale and supplemental guidance
10.3.3 Requirement enhancements
10.3.4 Security levels
10.4 SR 6.2 โ€“ Continuous monitoring
10.4.1 Requirement
10.4.2 Rationale and supplemental guidance
66 10.4.3 Requirement enhancements
10.4.4 Security levels
11 FR 7 โ€“ Resource availability
11.1 Purpose and SL-C(RA) descriptions
11.2 Rationale
67 11.3 SR 7.1 โ€“ Denial of service protection
11.3.1 Requirement
11.3.2 Rationale and supplemental guidance
11.3.3 Requirement enhancements
11.3.4 Security levels
11.4 SR 7.2 โ€“ Resource management
11.4.1 Requirement
11.4.2 Rationale and supplemental guidance
11.4.3 Requirement enhancements
68 11.4.4 Security levels
11.5 SR 7.3 โ€“ Control system backup
11.5.1 Requirement
11.5.2 Rationale and supplemental guidance
11.5.3 Requirement enhancements
11.5.4 Security levels
11.6 SR 7.4 โ€“ Control system recovery and reconstitution
11.6.1 Requirement
11.6.2 Rationale and supplemental guidance
69 11.6.3 Requirement enhancements
11.6.4 Security levels
11.7 SR 7.5 โ€“ Emergency power
11.7.1 Requirement
11.7.2 Rationale and supplemental guidance
11.7.3 Requirement enhancements
11.7.4 Security levels
11.8 SR 7.6 โ€“ Network and security configuration settings
11.8.1 Requirement
11.8.2 Rationale and supplemental guidance
70 11.8.3 Requirement enhancements
11.8.4 Security levels
11.9 SR 7.7 โ€“ Least functionality
11.9.1 Requirement
11.9.2 Rationale and supplemental guidance
11.9.3 Requirement enhancements
11.9.4 Security levels
71 11.10 SR 7.8 โ€“ Control system component inventory
11.10.1 Requirement
11.10.2 Rationale and supplemental guidance
11.10.3 Requirement enhancements
11.10.4 Security levels
72 Annex A (informative)Discussion of the SL vector
74 Figure A.1 โ€“ High-level process-industry example showing zones and conduits
75 Figure A.2 โ€“ High-level manufacturing example showing zones and conduits
76 Figure A.3 โ€“ Schematic of correlation of the use of different SL types
80 Annex B (informative)Mapping of SRs and REs to FR SL levels 1-4
Table B.1 โ€“ Mapping of SRs and REs to FR SL levels 1-4 (1 of 4)
84 Bibliography
BS EN IEC 62443-3-3:2019
$215.11