top of page
Writer's pictureValentina Bosenko

Networking and IT security standards



Information security as a concept in corporate structures has become significant in recent times. Nevertheless, for such a considerable amount of time, this category of structure has taken one of the leading positions in business and, therefore, has generated competition on a global scale. It no longer takes long periods of time to create a company that can compete globally, because the emphasis is on quality today. If you have decided that right now is the time to enter new markets in this industry, then the list of standards mentioned below will help you become leaders in the IT security industry.



IEC 62443-3-3:2019


Information security is increasingly becoming an issue that stimulates the emergence of new technologies. With a large number of innovations, chaos is created, which requires clear regulation. It is for this that international standards are created, one of which is IEC 62443-3-3: 2019.


This part of the IEC 62443 series provides detailed technical control system requirements (SRs) associated with the seven foundational requirements (FRs) described in IEC 62443‑1‑1 including defining the requirements for control system capability security levels, SL-C(control system). These requirements would be used by various members of the industrial automation and control system (IACS) community along with the defined zones and conduits for the system under consideration (SuC) while developing the appropriate control system target SL, SL-T(control system), for a specific asset.


As defined in IEC 62443‑1‑1 there are a total of seven FRs:


a) Identification and authentication control (IAC)


b) Use control (UC)


c) System integrity (SI)


d) Data confidentiality (DC)


e) Restricted data flow (RDF)


f) Timely response to events (TRE)


g) Resource availability (RA).


These seven requirements are the foundation for control system capability SLs, SL-C (control system).


If the scope of your company includes the use of information security systems, we recommend that you familiarize yourself with this document in more detail. Data security is not only the key to maintaining and improving financial performance, but also significantly affects the company's image in the eyes of the consumer at the international level.



IEC 62443-2-4:2019


The industrialization process has entailed a lot of transformational processes. Security control systems are more and more improved in the implementation of new structures. Since the scientific and technological base of different countries is sometimes absolutely diametrically opposite, there is a need for the unification of international requirements, which is carried out thanks to such standards as IEC 62443-2-4: 2019.


This part of IEC 62443 specifies a comprehensive set of requirements for security capabilities for IACS service providers that they can offer to the asset owner during integration and maintenance activities of an Automation Solution.


Because not all requirements apply to all industry groups and organizations, Subclause 4.1.4 provides for the development of Profiles that allow for the subsetting of these requirements. Profiles are used to adapt this document to specific environments, including environments not based on an IACS.


This part of the technological standard is significant in the information security industry and can give impetus to the development of the company's activities in interaction with organizations at the global level. If you are interested in purchasing this document, follow the link to our website for more detailed technical specifications.


EN IEC 62443-2-4:2019/A1:2019


The next parts of the above document are IEC 62443-2-4: 2019 / A1: 2019. Since the unification of the application of all parts of this international standard will make it possible not only to easily adapt the existing system to global requirements, but also to scale up activities at the local level, we recommend that you pay attention to them.


This part of IEC 62443 specifies a comprehensive set of requirements for security capabilities for IACS service providers that they can offer to the asset owner during integration and maintenance activities of an Automation Solution. Because not all requirements apply to all industry groups and organizations, Subclause 4.1.4 provides for the development of Profiles that allow for the subsetting of these requirements. Profiles are used to adapt this document to specific environments, including environments not based on an IACS.


Some of these capabilities reference security measures defined in IEC 62443-3-3 that the service provider must ensure are supported in the Automation Solution (either included in the control system product or separately added to the Automation Solution).


To avoid the mistake of acquiring the wrong standard, we strongly recommend that you create a list of niches in your business that require strengthening from a regulatory point of view. The next right step in the application of international standards will be a consultation with a specialist who will help you choose the document necessary for the development of your company.



EN IEC 62443-3-3:2019/AC:2019-10


The Internet as a business tool appeared relatively recently, but nevertheless, in such a short time, it managed to take a leading position in a number of resources for the development of activities and achieve high financial performance. Information security systems are gaining momentum in their development, thereby influencing the emergence of such international standards as IEC 62443-3-3: 2019 / AC: 2019-10.


This part of the IEC 62443 series provides detailed technical control system requirements (SRs) associated with the seven foundational requirements (FRs) described in IEC 62443‑1‑1 including defining the requirements for control system capability security levels, SL-C(control system). These requirements would be used by various members of the industrial automation and control system (IACS) community along with the defined zones and conduits for the system under consideration (SuC) while developing the appropriate control system target SL, SL-T(control system), for a specific asset.


The seven requirements in the document are the foundation for control system capability SLs, SL-C (control system). Defining security capability at the control system level is the goal and objective of this standard as opposed to target SLs, SL-T, or achieved SLs, SL-A, which are out of scope.


If the innovative technologies of your organization require a certain level of security and the systems used are constantly updated, then the availability of international standards will become a new stage in the better development of your company at the international level. Follow the link to our website to clarify all the details of interest and the questions you have.



IEC 62443-3-2:2020


The financial risks of an enterprise may depend not only on the final product result, but also on the structuring of operating activities. In the age of innovations and new technologies, the issue of information security is key in building a well-functioning system. For a more detailed and step-by-step development, such international documents as EN IEC 62443-3-2: 2020 are being created.


IEC 62443-3-2:2020(E) establishes requirements for:

  • defining a system under consideration (SUC) for an industrial automation and control system (IACS);

  • partitioning the SUC into zones and conduits;

  • assessing risk for each zone and conduit;

  • establishing the target security level (SL-T) for each zone and conduit;

  • documenting the security requirements.

To clarify all the details of this standard you are interested in, you can follow the link to our website and familiarize yourself with all the technical characteristics. If the specified information is not enough, you can always ask for help from a team of our specialists who will help you choose the most suitable standard for your activity.



EN IEC 62443-4-2:2019


Automation of production processes implies a structured approach to the formation of step-by-step instructions. The control of the activities carried out can be carried out both through the analysis of empirical findings and compliance with such standards as IEC 62443-4-2: 2019.


IEC 62443-4-2:2019 provides detailed technical control system component requirements (CRs) associated with the seven foundational requirements (FRs) described in IEC TS 62443-1-1 including defining the requirements for control system capability security levels and their components, SL-C(component).


As defined in IEC TS 62443-1-1 there are a total of seven foundational requirements (FRs):


identification and authentication control (IAC)

use control (UC), c) system integrity (SI),

data confidentiality (DC),

restricted data flow (RDF),

timely response to events (TRE), and

resource availability (RA)


The detailed technical characteristics of this document can enable you to check the compliance of the organization's technological base with international requirements and adapt them to the rules of today's international markets. That is why if you are interested in the long-term development of your company, we recommend that you think about purchasing these standards.

Defining security capability levels for the control system component is the goal and objective of this document as opposed to SL-T or achieved SLs (SL-A), which are out of scope.


Keep up with pace of modern international development


Since innovation is evolving every day, the pace of development of your company must correspond at least to market trends in order to achieve maximum results. It is difficult to keep track of each company's offerings and each consumer's demand. But for the globalization of the whole picture, such organizations and their standards as ISO, IEC, SIST are being created, which will greatly simplify your company's entry to the next level. And if your company needs to clarify the issues that have arisen, our team will always be happy to help you move to a new level.

0 comments

Comments


bottom of page