IEC-62443-2-4 › Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers
IEC-62443-2-4
-
EDITION 2.0
-
CURRENT
-- See the following:
IEC-62443-2-4-AM1
Show Complete Document History
Show Complete Document History
Document Center Inc. is an authorized dealer of IEC standards.
The following bibliographic material is provided to assist you with your purchasing decision:
The following bibliographic material is provided to assist you with your purchasing decision:
IEC 62443-2:2023 specifies a comprehensive set of requirements for security-related processes that IACS service providers can offer to the asset owner during integration and maintenance activities of an Automation Solution. Because not all requirements apply to all industry groups and organizations, Subclause 4.1.4 provides for the development of "profiles" that allow for the subsetting of these requirements. Profiles are used to adapt this document to specific environments, including environments not based on an IACS.
NOTE 1 The term "Automation Solution" is used as a proper noun (and therefore capitalized) in this document to prevent confusion with other uses of this term. Collectively, the security processes offered by an IACS service provider are referred to as its Security Program (SP) for IACS asset owners. In a related specification, IEC 62443-2-1 describes requirements for the Security Management System of the asset owner.
NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related. Figure 1 illustrates the integration and maintenance security processes of the asset owner, service provider(s), and product supplier(s) of an IACS and their relationships to each other and to the Automation Solution. Some of the requirements of this document relating to the safety program are associated with security requirements described in IEC 62443-3-3 and IEC 62443-4-2.
NOTE 3 The IACS is a combination of the Automation Solution and the organizational measures necessary for its design, deployment, operation, and maintenance.
NOTE 4 Maintenance of legacy system with insufficient security technical capabilities, implementation of policies, processes and procedures can be addressed through risk mitigation.
To find similar documents by classification:
25.040.40 (Industrial process measurement and control)
35.100 (Open systems interconnection (OSI))
This document comes with our free Notification Service, good for the life of the document.
This document is available in either Paper or PDF format.
Customers who bought this document also bought:
ISO-10012Measurement management systems - Requirements for measurement processes and measuring equipment
ISO/IEC-16022
Information technology - Automatic identification and data capture techniques - Data Matrix bar code symbology specification
ISO/IEC-13211-1
Information technology - Programming languages - Prolog - Part 1: General core
Document Number
IEC 62443-2-4 Ed. 2.0 b:2023
Revision Level
EDITION 2.0
Status
Current
Publication Date
Dec. 1, 2023
Committee Number
65