Skip to main content
Back

CLC IEC/TS 62443-6-1:2024

Security for industrial automation and control systems - Part 6-1: Security evaluation methodology for IEC 62443-2-4

General information

Valid from 16.12.2024
Base Documents
CLC IEC/TS 62443-6-1:2024; IEC/TS 62443-6-1:2024
Directives or regulations
None

Standard history

Status
Date
Type
Name
16.12.2024
Main
This part of IEC 62443 specifies the evaluation methodology to support interested parties (e.g. during conformity assessment activities) to achieve repeatable and reproducible evaluation results against IEC 62443-2-4 requirements. This document is intended for first-party, secondparty or third-party conformity assessment activity, for example by product suppliers, service providers, asset owners and conformity assessment bodies. NOTE 1 62443-2-4 specifies requirements for security capabilities of an IACS service provider. These security capabilities can be offered as a security program during integration and maintenance of an automation solution. NOTE 2 The term “conformity assessment” and the terms first-party conformity assessment activity, second-party conformity assessment activity and third-party conformity assessment activity are defined in ISO/IEC 17000.

Required fields are indicated with *

*
*
*
PDF
39.04 € incl tax
Paper
39.04 € incl tax
Browse standard from 2.44 € incl tax
Standard monitoring

Customers who bought this item also bought

Main

EVS-EN IEC 62443-2-4:2024

Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers
Newest version Valid from 01.02.2024
Main

CLC IEC/TS 62443-1-5:2024

Security for industrial automation and control systems - Part 1-5: Scheme for IEC 62443 security profiles
Newest version Valid from 01.07.2024
Main

EVS-EN IEC 62443-2-1:2024

Security for industrial automation and control systems - Part 2-1: Security program requirements for IACS asset owners
Newest version Valid from 01.10.2024
Main

EVS-EN IEC 62443-3-2:2020

Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
Newest version Valid from 15.09.2020