IEC 62443 Standard Overview
A comprehensive framework for securing industrial automation and control systems
The IEC 62443 series provides a flexible framework to address and mitigate current and future security vulnerabilities in industrial automation and control systems (IACS). This guide presents the latest status of the standard's components across all tiers.
The standard is organized into six tiers, each addressing different aspects of industrial cybersecurity, from general concepts to specific implementation and conformance requirements.
Document Types & Status Legend
Document Types
Publication Status
IEC 62443 Standard Structure
Tier 1: General
Covers fundamental concepts, terminology, and models for industrial automation and control systems security.
IEC 62443-1-1
PublishedTerminology, concepts and models
StandardEstablishes the core terminology and concepts used throughout the IEC 62443 series. Provides the foundation for understanding industrial cybersecurity principles.
IEC 62443-1-2
PublishedMaster glossary of terms and abbreviations
TRComprehensive glossary that standardizes terminology across all parts of the IEC 62443 series, ensuring consistent interpretation and application.
IEC 62443-1-3
In DevelopmentPerformance metrics for IACS security
TRDefines metrics for measuring the performance of security controls in industrial automation and control systems. Provides a framework for evaluating security effectiveness.
IEC 62443-1-4
PublishedIACS security lifecycle and use-cases
TRDescribes the security lifecycle for industrial automation and control systems. Provides practical use cases to illustrate security concepts and implementation approaches.
IEC 62443-1-5
In DevelopmentScheme for IEC 62443 Cyber Security Profiles
TREstablishes a framework for creating cybersecurity profiles based on the IEC 62443 standard. Enables industry-specific adaptations of the standard.
IEC 62443-1-6
In DevelopmentApplication of the ISA/IEC 62443 standards to the ICT
TRProvides guidance on applying IEC 62443 standards to Information and Communication Technology (ICT) systems that interact with industrial control systems.
Tier 2: Policies & Procedures
Addresses organizational security policies and procedures for industrial automation and control systems.
IEC 62443-2-1
New VersionSecurity program requirements for IACS asset owners
StandardDefines requirements for establishing and maintaining an effective cybersecurity management system for industrial automation and control systems. Focuses on organizational aspects of security.
IEC 62443-2-2
ReleasedIACS Security Protection Rating
PASProvides a methodology for rating the security protection capabilities of industrial automation and control systems. Helps organizations assess their security posture.
IEC 62443-2-3
PublishedPatch management in the IACS environment
TRProvides guidance on establishing and operating a patch management program for industrial automation and control systems. Addresses the unique challenges of patching operational technology.
IEC 62443-2-4
PublishedSecurity program requirements for IACS service providers
StandardSpecifies requirements for security programs of service providers that perform integration, maintenance, or other services for industrial automation and control systems.
IEC 62443-2-5
In DevelopmentImplementation guidance for IACS asset owners
TRProvides practical guidance for asset owners on implementing security controls in industrial environments. Includes best practices and implementation considerations.
Tier 3: System
Focuses on system-level security requirements and security assurance levels for industrial control systems.
IEC 62443-3-1
In DevelopmentSecurity technologies for IACS
TRProvides an overview of security technologies applicable to industrial automation and control systems. Includes guidance on selecting appropriate technologies for different environments.
IEC 62443-3-2
PublishedSecurity Risk Assessment for System Design
StandardEstablishes requirements for assessing cybersecurity risk for industrial automation and control systems. Provides a methodology for determining appropriate security levels for zones and conduits.
IEC 62443-3-3
PublishedSystem security requirements and security levels
StandardDefines system security requirements and security levels for industrial automation and control systems. Provides a framework for specifying security capabilities required for a given security level.
Tier 4: Component/Product
Addresses security requirements for components and development processes in industrial control systems.
IEC 62443-4-1
PublishedSecure Product Development Lifecycle Requirements
StandardSpecifies process requirements for the secure development of products used in industrial automation and control systems. Defines a secure development lifecycle for control system components.
IEC 62443-4-2
PublishedTechnical security requirements for IACS components
StandardProvides detailed technical security requirements for components used in industrial automation and control systems. Categorizes components and specifies requirements for each category.
Tier 5: Profiles
Provides industry-specific security profiles and implementation guidance for different sectors.
IEC 62443-5-x
In DevelopmentIndustry-Specific Profiles
TSSeries of documents providing industry-specific security profiles based on the IEC 62443 framework. Tailors security requirements to specific industrial sectors and applications.
Profile Tier Structure
The Profile Tier is a newly announced component of the IEC 62443 framework that provides sector-specific implementations of the standard:
- Adapts general requirements to specific industry needs
- Provides implementation guidance for specific sectors
- Enables consistent application across similar systems
Profile X
In DevelopmentSector-Specific Implementation
TSPlaceholder for future industry-specific security profiles. Will provide detailed implementation guidance for particular industrial sectors.
Profile Components
Each profile typically includes:
- Sector-specific threat models
- Tailored security control sets
- Implementation examples
- Sector-specific compliance guidance
Tier 6: Evaluation & Conformance
Provides methodologies for evaluating compliance with the IEC 62443 standard and certification frameworks.
IEC 62443-6-1
PublishedSecurity Evaluation Methodology for IEC 62443-2-4
TRProvides a methodology for evaluating compliance with the requirements specified in IEC 62443-2-4 for service providers. Establishes criteria for assessing service provider security programs.
IEC 62443-6-2
PublishedSecurity Evaluation Methodology for IEC 62443-4-2
TREstablishes a methodology for evaluating compliance with the technical security requirements for components specified in IEC 62443-4-2. Provides a framework for component certification.
Conformance & Certification
PublishedCertification Framework
TRThe Conformance & Certification tier establishes frameworks for certifying compliance with the IEC 62443 standard. This includes certification schemes for products, systems, and organizations.
Conformance Tiers
The standard defines multiple conformance tiers:
- Self-declaration of conformance
- Independent assessment
- Certification by accredited bodies
Certification Scope
Certification can be applied at different levels:
- Component certification (IEC 62443-4-x)
- System certification (IEC 62443-3-x)
- Organizational certification (IEC 62443-2-x)
IEC 62443 Implementation Lifecycle
The IEC 62443 standard follows a continuous improvement lifecycle with three main phases: Assess, Develop and Implement, and Maintain. This approach allows organizations to systematically build and improve their industrial cybersecurity capabilities.
1. Assess
Evaluate current security posture and identify risks to industrial control systems.
Key Activities:
- Inventory control systems and assets
- Identify zones and conduits
- Conduct risk assessment
- Determine target security levels
Key Standards:
2. Develop and Implement
Create and deploy security policies, procedures, and controls based on assessment results.
Key Activities:
- Develop security policies and procedures
- Create security architecture
- Implement network segmentation
- Deploy security controls
- Configure systems securely
- Train personnel
Key Standards:
3. Maintain
Continuously monitor, maintain, and improve the security of industrial control systems.
Key Activities:
- Monitor security controls
- Manage patches and updates
- Respond to security incidents
- Continuously improve security
- Conduct periodic reassessments