Back

Sorry - this product is no longer available

prEN IEC 62443-2-4:2022

Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers

General information
Draft
Base Documents
65/936/CDV; prEN IEC 62443-2-4:2022
Directives or regulations
None

Standard history

Status
Date
Type
Name
Main
prEN IEC 62443-2-4:2022
02.05.2019
Main
02.05.2019
Amendment
This part of IEC 62443 specifies a comprehensive set of requirements for security capabilities for IACS service providers that they can offer to the asset owner during integration and maintenance activities of an Automation Solution. Because not all requirements apply to all industry groups and organizations, Subclause 4.1.4 provides for the development of Profiles that allow for the subsetting of these requirements. Profiles are used to adapt this document to specific environments, including environments not based on an IACS. NOTE 1 The term “Automation Solution” is used as a proper noun (and therefore capitalized) in this part of IEC 62443 to prevent confusion with other uses of this term. Collectively, the security capabilities offered by an IACS service provider are referred to as its Security Program for IACS Asset Owners. In a related specification, IEC 62443-2-1 describes requirements for the Security Management System of the asset owner. NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related. Figure 1 illustrates the integration and maintenance security capabilities of the asset owner, service provider(s) and product supplier(s) of an IACS and their relationships to each other and to the Automation Solution. Some of the IEC 62443-2-4 security program requirements are associated with security requirements described in IEC 62443-3-3 and IEC 62443-4-2. NOTE 3 The IACS is a combination of the Automation Solution and the organizational measures necessary for its design, deployment, operation, and maintenance. NOTE 4 Maintenance of legacy system with insufficient security functional capabilities, implementation of policies, processes and procedures are recommended as risk mitigations
*
*
*
PDF
28.67 € incl tax
Paper
28.67 € incl tax
Standard monitoring