Skip to main content
> IEC 62443

IEC 62443 Industrial Automation and Control Systems Security

International standard for securing industrial control systems and operational technology

Established: 2007 (evolved from ISA/IEC 62443) Last Updated: Ongoing (multiple parts updated 2018-2023) Scope: Industrial Automation and Control Systems (IACS)
SL 0-4
Security Levels

// What is IEC 62443?

IEC 62443 is a comprehensive series of standards addressing cybersecurity for industrial automation and control systems (IACS). Developed jointly with ISA (ISA/IEC 62443), it provides a systematic approach to securing operational technology environments including SCADA systems, distributed control systems, and programmable logic controllers.

Unlike IT-focused frameworks, IEC 62443 is designed specifically for OT environments where safety, availability, and reliability are paramount. The standards address security throughout the system lifecycle—from product development to system integration to operations and maintenance.

The framework uses Security Levels (SL 0-4) to define required protection based on threat sophistication, enabling organizations to match security investments to actual risk. Compliance is increasingly required in regulated industries and by critical infrastructure operators worldwide.

// Inside the Regulation

IEC 62443 comprises multiple parts organized into four main groups: General concepts, Policies and Procedures, System-level requirements, and Component-level requirements.

1

General Concepts (62443-1-x)

Foundation documents defining terminology, concepts, and security models.

62443-1-1: Terminology and Concepts

Establishes common vocabulary and foundational concepts for IACS security.

62443-1-2: Master Glossary

Comprehensive definitions for terms used throughout the standard series.

62443-1-3: System Security Conformance Metrics

Quantitative metrics for measuring security conformance and effectiveness.

2

Policies and Procedures (62443-2-x)

Requirements for security management programs and processes.

62443-2-1: Security Program Requirements

Establishing and maintaining an IACS security management system including policies, procedures, and practices.

62443-2-2: IACS Security Program Ratings

Protection levels and maturity model for security program assessment.

62443-2-3: Patch Management

Requirements for patch management in IACS environments where traditional IT patching may be impractical.

62443-2-4: Security Requirements for IACS Service Providers

Security requirements for integrators, maintenance providers, and other service providers.

3

System Level (62443-3-x)

Requirements for secure system architecture and design.

62443-3-2: Security Risk Assessment

Methodology for assessing cybersecurity risk to IACS, identifying zones and conduits.

62443-3-3: System Security Requirements and Security Levels

Defines Security Levels (SL 1-4) and specific requirements for each level covering access control, use control, data integrity, confidentiality, and more.

4

Component Level (62443-4-x)

Requirements for secure product development and component security.

62443-4-1: Product Development Requirements

Secure development lifecycle requirements for IACS products including security by design.

62443-4-2: Technical Security Requirements for Components

Security capabilities required in IACS components at each Security Level.

Note: Security Levels in IEC 62443 range from SL 0 (no specific requirements) to SL 4 (protection against sophisticated attacks with extended resources). Most industrial applications require SL 2 (protection against intentional violation using simple means) or SL 3 (protection against sophisticated attacks).

// Who Must Comply

  • 1 Critical infrastructure operators with industrial control systems
  • 2 Manufacturing facilities with automated production
  • 3 Oil and gas companies with pipeline SCADA systems
  • 4 Electric utilities with grid control systems
  • 5 Water and wastewater treatment facilities
  • 6 Chemical and pharmaceutical manufacturers
  • 7 IACS product vendors and system integrators

// Key Requirements

Zone and Conduit Model

Segment OT environments into security zones with controlled communication conduits

Security Levels

Assign and implement appropriate Security Levels (SL 1-4) based on risk assessment

Access Control

Implement role-based access control for all IACS components and functions

Use Control

Restrict and monitor use of IACS components to authorized purposes

System Integrity

Ensure integrity of IACS components, data, and software through validation and monitoring

Incident Response

Maintain IACS-specific incident response capabilities including OT recovery procedures

// Enforcement & Penalties

IEC 62443 is a voluntary international standard without direct enforcement penalties. However, compliance is increasingly required by regulation, contract, or insurance. Failure to meet industry-standard security practices creates significant liability exposure.

Examples:

  • Regulatory citations where IEC 62443 is referenced (NERC CIP, FDA, etc.)
  • Contract disputes with customers requiring IEC 62443 compliance
  • Insurance claim denials where industry standards weren't met
  • Civil liability following OT security incidents affecting safety

// Cyber Insurance Impact

Industrial and OT cyber insurance policies increasingly reference IEC 62443 as the expected standard of care. Policies may require evidence of zone/conduit implementation, Security Level achievement, and ongoing compliance. Premium discounts may be available for certified compliance.

// How Breach Craft Helps

We help organizations achieve IEC 62443 compliance through genuine security improvements—not checkbox exercises. Our services address the specific requirements and challenges of IEC 62443.

Ready to Strengthen Your Defenses?

Schedule a free consultation with our security experts to discuss your organization's needs.

Or call us directly at (445) 273-2873