Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers (IEC 62443-2-4:2015)

This part of IEC 62443 specifies a comprehensive set of requirements for security capabilities
for IACS service providers that they can offer to the asset owner during integration and
maintenance activities of an Automation Solution. Because not all requirements apply to all
industry groups and organizations, Subclause 4.1.4 provides for the development of Profiles
that allow for the subsetting of these requirements. Profiles are used to adapt this document
to specific environments, including environments not based on an IACS.
NOTE 1 The term “Automation Solution” is used as a proper noun (and therefore capitalized) in this part of
IEC 62443 to prevent confusion with other uses of this term.
Collectively, the security capabilities offered by an IACS service provider are referred to as its
Security Program. In a related specification, IEC 62443-2-1 describes requirements for the
Security Management System of the asset owner.
NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related.
Figure 2 illustrates how the integration and maintenance capabilities relate to the IACS and
the control system product that is integrated into the Automation Solution. Some of these
capabilities reference security measures defined in IEC 62443-3-3 that the service provider
must ensure are supported in the Automation Solution (either included in the control system
product or separately added to the Automation Solution).

IT-Sicherheit für industrielle Automatisierungssysteme - Teil 2-4: Anforderungen an das IT-Sicherheitsprogramm von Dienstleistern für industrielle Automatisierungssysteme (IEC 62443-2-4:2015)

Sécurité des automatismes industriels et des systèmes de commande – Partie 2-4: Exigences de programme de sécurité pour les fournisseurs de service IACS (IEC 62443-2-4:2015)

L'IEC 62443-2-4:2015 spécifie les exigences de capacités de sécurité pour les fournisseurs de service IACS qu'ils peuvent proposer au propriétaire d'actif pendant les activités d'intégration et de maintenance d'une Solution d'Automatisation.
Le contenu du corrigendum d'août 2015 a été pris en considération dans cet exemplaire.

Zaščita industrijske avtomatizacije in nadzornih sistemov - 2-4. del: Zahteve za program varnosti zaščite za ponudnike storitev IACS (IEC 62443-2-4:2015)

Ta del standarda IEC 62443 določa izčrpen sklop zahtev za zmogljivosti zaščite
za ponudnike storitev IACS, ki jih lahko ponudijo lastniku dobrine med integracijo in
vzdrževanjem Rešitve avtomatizacije. Ker vse zahteve ne veljajo za vse
industrijske skupine in organizacije, podtočka 4.1.4 zagotavlja razvoj profilov, ki
omogočajo podnabor teh zahtev. Profili se uporabljajo za prilagoditev tega dokumenta
posebnim okoljem, vključno z okolji, ki ne temeljijo na skupnosti IACS.
OPOMBA 1: Izraz »Rešitev avtomatizacije« se v tem delu standarda IEC 62443 uporablja kot lastno ime (in je zato zapisan z veliko začetnico), da ga ni mogoče zamenjati z drugimi uporabami tega izraza.
Skupaj se zmogljivosti zaščite, ki jih ponuja ponudnik storitev IACS, imenujejo njegov
program varnosti zaščite. V povezani specifikaciji standard IEC 62443-2-1 opisuje zahteve za
sistem vodenja zaščite lastnika dobrine.
OPOMBA 2: Na splošno so te zmogljivosti zaščite povezane s politiko, postopki, prakso in osebjem.
Na sliki 2 je prikazano, kako so zmogljivosti integracije in vzdrževanja povezane s skupnostjo IACS in
izdelkom nadzornega sistema, ki je integriran v Rešitev avtomatizacije. Nekatere od teh
zmogljivosti se navezujejo na ukrepe za zaščito iz standarda IEC 62443-3-3, za katere mora ponudnik storitev
zagotoviti, da jih Rešitev avtomatizacije podpira (so vključeni v izdelku nadzornega
sistema ali pa so v Rešitev avtomatizacije dodani posebej).

General Information

Status
Published
Public Enquiry End Date
30-Jan-2019
Publication Date
02-Oct-2019
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
09-May-2019
Due Date
14-Jul-2019
Completion Date
03-Oct-2019

Relations

Buy Standard

Standard
EN IEC 62443-2-4:2019 - POZOR ! DEl IEC standarda je Excel datoteka "iec62443-2-4{ed1.0}b-Calculation sheet". BARVE
English language
89 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day
Standard
EN IEC 62443-2-4:2019 - POZOR ! DEl IEC standarda je Excel datoteka "iec62443-2-4{ed1.0}b-Calculation sheet". Dodati na DC-romu! BARVE v IEC standardu! Vodni pretisk na sredini strani na PDF-str: od str 26 do 89
English language
89 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day
Standard
EN IEC 62443-2-4:2019 - POZOR ! DEl IEC standarda je Excel datoteka "iec62443-2-4{ed1.0}b-Calculation sheet". Dodati na DC-romu! BARVE v IEC standadu! SIST standard je brez vodnega pretiska (povsod v tabelah IEC standarda se pretisk prestavi na sredino strani, čez tekst standarda)
English language
89 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day
Draft
prEN 62443-2-4:2019 - POZOR ! DEl IEC standarda je Excel datoteka "iec62443-2-4{ed1.0}b-Calculation sheet". BARVE
English language
89 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

SLOVENSKI STANDARD
SIST EN IEC 62443-2-4:2019
01-november-2019
Zaščita industrijske avtomatizacije in nadzornih sistemov - 2-4. del: Zahteve za
program varnosti zaščite za ponudnike storitev IACS (IEC 62443-2-4:2015)
Security for industrial automation and control systems - Part 2-4: Security program
requirements for IACS service providers (IEC 62443-2-4:2015)
IT-Sicherheit für industrielle Automatisierungssysteme - Teil 2-4: Anforderungen an das
IT-Sicherheitsprogramm von Dienstleistern für industrielle Automatisierungssysteme (IEC
62443-2-4:2015)
Sécurité des automatismes industriels et des systèmes de commande Partie 2-4:
Exigences de programme de sécurité pour les fournisseurs de service IACS (IEC 62443-
2-4:2015)
Ta slovenski standard je istoveten z: EN IEC 62443-2-4:2019
ICS:
25.040.01 Sistemi za avtomatizacijo v Industrial automation
industriji na splošno systems in general
35.030 Informacijska varnost IT Security
SIST EN IEC 62443-2-4:2019 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN IEC 62443-2-4:2019

---------------------- Page: 2 ----------------------
SIST EN IEC 62443-2-4:2019


EUROPEAN STANDARD EN IEC 62443-2-4

NORME EUROPÉENNE

EUROPÄISCHE NORM
April 2019
ICS 25.040.40; 35.100.05

English Version
Security for industrial automation and control systems - Part 2-4:
Security program requirements for IACS service providers
(IEC 62443-2-4:2015)
Sécurité des automatismes industriels et des systèmes de IT-Sicherheit für industrielle Automatisierungssysteme - Teil
commande - Partie 2-4: Exigences de programme de 2-4: Anforderungen an das IT-Sicherheitsprogramm von
sécurité pour les fournisseurs de service IACS Dienstleistern für industrielle Automatisierungssysteme
(IEC 62443-2-4:2015) (IEC 62443-2-4:2015)
This European Standard was approved by CENELEC on 2019-04-03. CENELEC members are bound to comply with the CEN/CENELEC
Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration.
Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC
Management Centre or to any CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by translation
under the responsibility of a CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the
same status as the official versions.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,
Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia,
Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden,
Switzerland, Turkey and the United Kingdom.


European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2019 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.
 Ref. No. EN IEC 62443-2-4:2019 E

---------------------- Page: 3 ----------------------
SIST EN IEC 62443-2-4:2019
EN IEC 62443-2-4:2019 (E)
European foreword
This document (EN IEC 62443-2-4:2019) consists of the text of IEC 62443-2-4:2015 prepared by
IEC/TC 65 "Industrial-process measurement, control and automation".
The following dates are fixed:
• latest date by which the document has to be implemented at national (dop) 2020-04-03
level by publication of an identical national standard or by endorsement
• latest date by which the national standards conflicting with the (dow) 2022-04-03
document have to be withdrawn

Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CENELEC shall not be held responsible for identifying any or all such patent rights.

Endorsement notice
The text of the International Standard IEC 62443-2-4:2015 was approved by CENELEC as a
European Standard without any modification.
In the official version, for Bibliography, the following notes have to be added for the standards
indicated:
IEC 61508 (series) NOTE Harmonized as EN 61508 (series)
IEC 61511 (series) NOTE Harmonized as EN 61511 (series)
IEC 62264-1:2013 NOTE Harmonized as EN 62264-1:2013 (not modified)
IEC 62443-3-3:2013 NOTE Harmonized as EN IEC 62443-3-3:2019 (not modified)
IEC 62443-4-1 NOTE Harmonized as EN IEC 62443-4-1
IEC 62443-4-2 NOTE Harmonized as EN IEC 62443-4-2





2

---------------------- Page: 4 ----------------------
SIST EN IEC 62443-2-4:2019




IEC 62443-2-4

®


Edition 1.0 2015-06




INTERNATIONAL



STANDARD




NORME



INTERNATIONALE
colour

inside










Security for industrial automation and control systems –

Part 2-4: Security program requirements for IACS service providers




Sécurité des automatismes industriels et des systèmes de commande –

Partie 2-4: Exigences de programme de sécurité pour les fournisseurs de

service IACS















INTERNATIONAL

ELECTROTECHNICAL

COMMISSION


COMMISSION

ELECTROTECHNIQUE


INTERNATIONALE




ICS 25.040.40; 35.040; 35.100 ISBN 978-2-8322-2767-1



Warning! Make sure that you obtained this publication from an authorized distributor.

Attention! Veuillez vous assurer que vous avez obtenu cette publication via un distributeur agréé.

® Registered trademark of the International Electrotechnical Commission
Marque déposée de la Commission Electrotechnique Internationale

---------------------- Page: 5 ----------------------
SIST EN IEC 62443-2-4:2019
– 2 – IEC 62443-2-4:2015 © IEC 2015
CONTENTS
FOREWORD. 3
INTRODUCTION . 5
1 Scope . 6
2 Normative references . 7
3 Terms, definitions, abbreviated terms and acronyms . 7
3.1 Terms and definitions . 7
3.2 Abbreviations . 10
4 Concepts . 11
4.1 Use of IEC 62443-2-4 . 11
4.1.1 Use of IEC 62443-2-4 by IACS service providers . 11
4.1.2 Use of IEC 62443-2-4 by IACS asset owners . 12
4.1.3 Use of IEC 62443-2-4 during negotiations between IACS asset owners
and IACS service providers . 12
4.1.4 Profiles . 12
4.1.5 IACS integration service providers . 13
4.1.6 IACS maintenance service providers . 13
4.2 Maturity model . 14
5 Requirements overview . 15
5.1 Contents . 15
5.2 Sorting and filtering . 15
5.3 IEC 62264-1 hierarchy model . 16
5.4 Requirements table columns . 16
5.5 Column definitions . 16
5.5.1 Req ID column . 16
5.5.2 BR/RE column . 16
5.5.3 Functional area column . 17
5.5.4 Topic column . 18
5.5.5 Subtopic column . 19
5.5.6 Documentation column . 21
5.5.7 Requirement description. 21
5.5.8 Rationale . 21
Annex A (normative) Security requirements . 22
Bibliography . 85

Figure 1 – Parts of the IEC 62443 Series . 5
Figure 2 – Scope of service provider capabilities . 6

Table 1 – Maturity levels . 15
Table 2 – Columns . 16
Table 3 – Functional area column values . 18
Table 4 – Topic column values . 19
Table 5 – Subtopic column values . 20
Table A.1 – Security program requirements . 22

---------------------- Page: 6 ----------------------
SIST EN IEC 62443-2-4:2019
IEC 62443-2-4:2015 © IEC 2015 – 3 –
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________

SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –

Part 2-4: Security program requirements
for IACS service providers

FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
International Standard IEC 62443-2-4 has been prepared by IEC technical committee 65:
Industrial-process measurement, control and automation.
This publication contains an attached file in the form of an Excel 97-2003 spreadsheet version
of Table A.1. This file is intended to be used as a complement and does not form an integral
part of the publication.
The text of this standard is based on the following documents:
CDV Report on voting
65/545/CDV 65/561A/RVC

Full information on the voting for the approval of this standard can be found in the report on
voting indicated in the above table.

---------------------- Page: 7 ----------------------
SIST EN IEC 62443-2-4:2019
– 4 – IEC 62443-2-4:2015 © IEC 2015
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2.
A list of all parts in the IEC 62443 series, published under the general title Security for
industrial automation and control systems, can be found on the IEC website.
Future standards in this series will carry the new general title as cited above. Titles of existing
standards in this series will be updated at the time of the next edition.
The committee has decided that the contents of this publication will remain unchanged until
the stability date indicated on the IEC web site under "http://webstore.iec.ch" in the data
related to the specific publication. At this date, the publication will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
The contents of the corrigendum of August 2015 have been included in this copy.

IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates
that it contains colours which are considered to be useful for the correct
understanding of its contents. Users should therefore print this document using a
colour printer.

---------------------- Page: 8 ----------------------
SIST EN IEC 62443-2-4:2019
IEC 62443-2-4:2015 © IEC 2015 – 5 –
INTRODUCTION
This standard is the part of the IEC 62443 series that contains security requirements for
providers of integration and maintenance services for Industrial Automation and Control
Systems (IACS). It has been developed by IEC Technical Committee 65 in collaboration with
the International Instrumentation Users Association, referred to as the WIB from its original
and now obsolete Dutch name, and ISA 99 committee members.
Figure 1 illustrates the relationship of the different parts of IEC 62443 being developed. Those
that are normatively referenced are included in the list of normative references in Clause 2,
and those that are referenced for informational purposes or that are in development are listed
in the Bibliography.

IEC 62443-1.1 IEC TR-62443-1.2 IEC 62443-1.3 IEC TR-62443-1.4
Terminology,
Master glossary of System security IACS security
concepts and models
terms and abbreviations compliance metrics lifecycle and use-case
IEC 62443-2.1 IEC TR-62443-2.2 IEC TR-62443-2.3 IEC 62443-2.4
Requirements for an Security program
Implementation guidance
Patch management in
IACS security requirements for
for an IACS security
the IACS environment
management system IACS service providers
management system
IEC TR-62443-3.1 IEC 62443-3.2 IEC 62443-3.3
System security
Security technologies Security levels for
requirements and
for IACS zones and conduits
security levels
IEC 62443-4.1 IEC 62443-4.2
Technical security
Product development
requirements for IACS
requirements
components
IEC

Figure 1 – Parts of the IEC 62443 Series
Policies and
Component System
General
procedures

---------------------- Page: 9 ----------------------
SIST EN IEC 62443-2-4:2019
– 6 – IEC 62443-2-4:2015 © IEC 2015
SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –

Part 2-4: Security program requirements
for IACS service providers



1 Scope
This part of IEC 62443-2-4 specifies requirements for security capabilities for IACS service
providers that they can offer to the asset owner during integration and maintenance activities
of an Automation Solution.
NOTE 1 The term “Automation Solution” is used as a proper noun (and therefore capitalized) in this part of
IEC 62443 to prevent confusion with other uses of this term.
Collectively, the security capabilities offered by an IACS service provider are referred to as its
Security Program. In a related specification, IEC 62443-2-1 describes requirements for the
Security Management System of the asset owner.
NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related.
Figure 2 illustrates how the integration and maintenance capabilities relate to the IACS and
the control system product that is integrated into the Automation Solution. Some of these
capabilities reference security measures defined in IEC 62443-3-3 that the service provider
must ensure are supported in the Automation Solution (either included in the control system
product or separately added to the Automation Solution).
Industrial Automation and Control System (IACS)
Operational and maintenance
Asset
operates
capabilities (policies and
Owner
procedures)
+
Automation Solution
System
integration capabilities
Safety
Basic Process
Integrator Complementary
Instrumented
(design and deployment) Control System
hardware and
System (SIS)
(BPCS)
software
 IACS environment / project specific
Includes a configured instance of the Control System Product
Control System Product as a combination of
Product
develops
Supplier Supporting Embedded Network Host
Applications devices components devices
 Independent of IACS environment
IEC

Figure 2 – Scope of service provider capabilities
In Figure 2, the Automation Solution is illustrated to contain a Basic Process Control System
(BPCS), optional Safety Instrumented System (SIS), and optional supporting applications,
such as advanced control. The dashed boxes indicate that these components are “optional”.

---------------------- Page: 10 ----------------------
SIST EN IEC 62443-2-4:2019
IEC 62443-2-4:2015 © IEC 2015 – 7 –
NOTE 3 The term “process” in BPCS may apply to a variety of industrial processes, including continuous
processes and manufacturing processes.
NOTE 4 Clause 4.1.4 describes profiles and how they can be used by industry groups and other organizations to
adapt this International Standard to their specific environments, including environments not based on an IACS.
NOTE 5 Automation Solutions typically have a single control system (product), but they are not restricted to do
so. In general, the Automation Solution is the set of hardware and software, independent of product packaging, that
is used to control a physical process (e.g. continuous or manufacturing) as defined by the asset owner.
2 Normative references
The following referenced documents are indispensable for the application of this document.
For dated references, only the edition cited applies. For undated references, the latest edition
of the referenced document (including any amendments) applies.
“None”
3 Terms, definitions, abbreviated terms and acronyms
3.1 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1.1
asset owner
individual or organization responsible for one or more IACSs
Note 1 to entry: Used in place of the generic word end user to provide differentiation.
Note 2 to entry: This definition includes the components that are part of the IACS.
Note 3 to entry: In the context of this standard, asset owner also includes the operator of the IACS.
3.1.2
attack surface
physical and functional interfaces of a system that can be accessed and through which the
system can be potentially exploited
Note 1 to entry: The size of the attack surface for a software interface is proportional to the number of methods
and parameters defined for the interface. Simple interfaces, therefore, have smaller attack surfaces than complex
interfaces.
Note 2 to entry: The size of the attack surface and the number of vulnerabilities are not necessarily related to
each other.
3.1.3
Automation Solution
control system and any complementary hardware and software components that have been
installed and configured to operate in an IACS
Note 1 to entry: Automation Solution is used as a proper noun in this part of IEC 62443.
Note 2 to entry: The difference between the control system and the Automation Solution is that the control system
is incorporated into the Automation Solution design (e.g. a specific number of workstations, controllers, and
devices in a specific configuration), which is then implemented. The resulting configuration is referred to as the
Automation Solution.
Note 3 to entry: The Automation Solution may be comprised of components from multiple suppliers, including the
product supplier of the control system.

---------------------- Page: 11 ----------------------
SIST EN IEC 62443-2-4:2019
– 8 – IEC 62443-2-4:2015 © IEC 2015
3.1.4
basic process control system
system that responds to input signals from the process, its associated equipment, other
programmable systems and/or an operator and generates output signals causing the process
and its associated equipment to operate in the desired manner but does not perform any
safety integrated functions (SIF)
Note 1 to entry: Safety instrumented functions are specified in the IEC 61508 series.
Note 2 to entry: The term “process” in this definition may apply to a variety of industrial processes, including
continuous processes and manufacturing processes.
3.1.5
consultant
subcontractor that provides expert advice or guidance to the integration or maintenance
service provider
3.1.6
control system
hardware and software components used in the design and implementation of an IACS
Note 1 to entry: As shown in Figure 2, control systems are composed of field devices, embedded control devices,
network devices, and host devices (including workstations and servers.
Note 2 to entry: As shown in Figure 2, control systems are represented in the Automation Solution by a BPCS and
an optional SIS.
3.1.7
handover
act of turning an Automation Solution over to the asset owner
Note 1 to entry: Handover effectively transfers responsibility for operations and maintenance of an
Automation Solution from the integration service provider to the asset owner and generally occurs after successful
completion of system test, often referred to as Site Acceptance Test (SAT).
3.1.8
industrial automation and control system
collection of personnel, hardware, software, procedures and policies involved in the operation
of the industrial process and that can affect or influence its safe, secure and reliable operation
Note 1 to entry: The IACS may include components that are not installed at the asset owner’s site.
Note 2 to entry: The definition of IACS was taken from in IEC-62443-3-3 and is illustrated in Figure 2. Examples
of IACSs include Distributed Control Systems (DCS) and Supervisory Control and Data Acquisition (SCADA)
systems. IEC 62443-2-4 also defines the proper noun “Solution” to mean the specific instance of the control system
product and possibly additional components that are designed into the IACS. The Automation Solution, therefore,
differs from the control system since it represents a specific implementation (design and configuration) of the
control system hardware and software components for a specific asset owner.
3.1.9
integration service provider
service provider that provides integration activities for an Automation Solution including
design, installation, configuration, testing, commissioning, and handover
Note 1 to entry: Integration service providers are often referred to as integrators or Main Automation Contractors
(MAC).
3.1.10
maintenance service provider
service provider that provides support activities for an Automation Solution after handover
Note 1 to entry: Maintenance is often considered to be distinguished from operation (e.g. in common colloquial
language it is often assumed that an Automation Solution is either in operation or under maintenance).
Maintenance service providers can perform support activities during operations, e.g. managing user accounts,
security monitoring, and security assessments.

---------------------- Page: 12 ----------------------
SIST EN IEC 62443-2-4:2019
IEC 62443-2-4:2015 © IEC 2015 – 9 –
3.1.11
portable media
portable devices that contain data storage capabilities that can be used to physically copy
data from one piece of equipment and transfer it to another
Note 1 to entry: Types of portable media include but are not limited to: CD / DVD / BluRay Media, USB memory
devices, smart phones, flash memory, solid state disks, hard drives, handhelds, and portable computers.
3.1.12
product supplier
manufacturer of hardware and/or software product
Note 1 to entry: Used in place of the generic word vendor to provide differentiation.
3.1.13
remote access
access to a control system through an external interface of the control system
Note 1 to entry: Examples of applications that support remote access include RDP, OPC, and Syslog.
Note 2 to entry: In general, remote access applications and the Automation Solution will reside in different
security zones as determined by the asset owner. See IEC 62443-3-2 for the application of zones and conduits to
the Automation Solution by the asset owner.
3.1.14
safety instrumented system
system used to implement functional safety
Note 1 to entry: See IEC 61508 and IEC 61511 for more information on functional safety.
3.1.15
security compromise
violation of the security of a system such that an unauthorized (1) disclosure or modification
of information or (2) denial of service may have occurred
Note 1 to entry: A security compromise represents a breach of the security of a system or an infraction of its
security policies. It is independent of impact or potential impact to the system.
3.1.16
security incident
security compromise that is of some significance to the asset owner or failed attempt to
compromise the system whose result could have been of some significance to the asset
owner
Note 1 to entry: The term “of some significance’ is relative to the environment in which the security compromise is
detected. For example, the same compromise may be declared as a security incident in one environment and not in
another. Triage activities are often used by asset owners to evaluate security compromises and identify those that
are significant enough to be considered incidents.
Note 2 to entry: In some environments, failed attempts to compromise the system, such as failed login attempts,
are considered significant enough to be classified as security incidents.
3.1.17
security patch
software patch that is relevant to the security of a software component
Note 1 to entry: For the purpose of this definition, firmware is considered software.
Note 2 to entry: Software patches may address known or potential vulnerabilities, or simply improve the security
of the software component, including its reliable operation.
3.1.18
security program
portfolio of security services, including integration services and maintenance services, and
their associated policies,
...

SLOVENSKI STANDARD
SIST EN IEC 62443-2-4:2019
01-november-2019
Zaščita industrijske avtomatizacije in nadzornih sistemov - 2-4. del: Zahteve za
program varnosti zaščite za ponudnike storitev IACS (IEC 62443-2-4:2015)
Security for industrial automation and control systems - Part 2-4: Security program
requirements for IACS service providers (IEC 62443-2-4:2015)
IT-Sicherheit für industrielle Automatisierungssysteme - Teil 2-4: Anforderungen an das
IT-Sicherheitsprogramm von Dienstleistern für industrielle Automatisierungssysteme
(IEC 62443-2-4:2015)
Sécurité des automatismes industriels et des systèmes de commande Partie 2-4:
Exigences de programme de sécurité pour les fournisseurs de service IACS (IEC 62443-
2-4:2015)
Ta slovenski standard je istoveten z: EN IEC 62443-2-4:2019
ICS:
25.040.01 Sistemi za avtomatizacijo v Industrial automation
industriji na splošno systems in general
35.030 Informacijska varnost IT Security
SIST EN IEC 62443-2-4:2019 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN IEC 62443-2-4:2019

---------------------- Page: 2 ----------------------
SIST EN IEC 62443-2-4:2019


EUROPEAN STANDARD EN IEC 62443-2-4

NORME EUROPÉENNE

EUROPÄISCHE NORM
April 2019
ICS 25.040.40; 35.100.05

English Version
Security for industrial automation and control systems - Part 2-4:
Security program requirements for IACS service providers
(IEC 62443-2-4:2015)
Sécurité des automatismes industriels et des systèmes de IT-Sicherheit für industrielle Automatisierungssysteme - Teil
commande - Partie 2-4: Exigences de programme de 2-4: Anforderungen an das IT-Sicherheitsprogramm von
sécurité pour les fournisseurs de service IACS Dienstleistern für industrielle Automatisierungssysteme
(IEC 62443-2-4:2015) (IEC 62443-2-4:2015)
This European Standard was approved by CENELEC on 2019-04-03. CENELEC members are bound to comply with the CEN/CENELEC
Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration.
Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC
Management Centre or to any CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by translation
under the responsibility of a CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the
same status as the official versions.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,
Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia,
Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden,
Switzerland, Turkey and the United Kingdom.


European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2019 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.
 Ref. No. EN IEC 62443-2-4:2019 E

---------------------- Page: 3 ----------------------
SIST EN IEC 62443-2-4:2019
EN IEC 62443-2-4:2019 (E)
European foreword
This document (EN IEC 62443-2-4:2019) consists of the text of IEC 62443-2-4:2015 prepared by
IEC/TC 65 "Industrial-process measurement, control and automation".
The following dates are fixed:
• latest date by which the document has to be implemented at national (dop) 2020-04-03
level by publication of an identical national standard or by endorsement
• latest date by which the national standards conflicting with the (dow) 2022-04-03
document have to be withdrawn

Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CENELEC shall not be held responsible for identifying any or all such patent rights.

Endorsement notice
The text of the International Standard IEC 62443-2-4:2015 was approved by CENELEC as a
European Standard without any modification.
In the official version, for Bibliography, the following notes have to be added for the standards
indicated:
IEC 61508 (series) NOTE Harmonized as EN 61508 (series)
IEC 61511 (series) NOTE Harmonized as EN 61511 (series)
IEC 62264-1:2013 NOTE Harmonized as EN 62264-1:2013 (not modified)
IEC 62443-3-3:2013 NOTE Harmonized as EN IEC 62443-3-3:2019 (not modified)
IEC 62443-4-1 NOTE Harmonized as EN IEC 62443-4-1
IEC 62443-4-2 NOTE Harmonized as EN IEC 62443-4-2





2

---------------------- Page: 4 ----------------------
SIST EN IEC 62443-2-4:2019




IEC 62443-2-4

®


Edition 1.0 2015-06




INTERNATIONAL



STANDARD




NORME



INTERNATIONALE
colour

inside










Security for industrial automation and control systems –

Part 2-4: Security program requirements for IACS service providers




Sécurité des automatismes industriels et des systèmes de commande –

Partie 2-4: Exigences de programme de sécurité pour les fournisseurs de

service IACS















INTERNATIONAL

ELECTROTECHNICAL

COMMISSION


COMMISSION

ELECTROTECHNIQUE


INTERNATIONALE




ICS 25.040.40; 35.040; 35.100 ISBN 978-2-8322-2767-1



Warning! Make sure that you obtained this publication from an authorized distributor.

Attention! Veuillez vous assurer que vous avez obtenu cette publication via un distributeur agréé.

® Registered trademark of the International Electrotechnical Commission
Marque déposée de la Commission Electrotechnique Internationale

---------------------- Page: 5 ----------------------
SIST EN IEC 62443-2-4:2019
– 2 – IEC 62443-2-4:2015 © IEC 2015
CONTENTS
FOREWORD. 3
INTRODUCTION . 5
1 Scope . 6
2 Normative references . 7
3 Terms, definitions, abbreviated terms and acronyms . 7
3.1 Terms and definitions . 7
3.2 Abbreviations . 10
4 Concepts . 11
4.1 Use of IEC 62443-2-4 . 11
4.1.1 Use of IEC 62443-2-4 by IACS service providers . 11
4.1.2 Use of IEC 62443-2-4 by IACS asset owners . 12
4.1.3 Use of IEC 62443-2-4 during negotiations between IACS asset owners
and IACS service providers . 12
4.1.4 Profiles . 12
4.1.5 IACS integration service providers . 13
4.1.6 IACS maintenance service providers . 13
4.2 Maturity model . 14
5 Requirements overview . 15
5.1 Contents . 15
5.2 Sorting and filtering . 15
5.3 IEC 62264-1 hierarchy model . 16
5.4 Requirements table columns . 16
5.5 Column definitions . 16
5.5.1 Req ID column . 16
5.5.2 BR/RE column . 16
5.5.3 Functional area column . 17
5.5.4 Topic column . 18
5.5.5 Subtopic column . 19
5.5.6 Documentation column . 21
5.5.7 Requirement description. 21
5.5.8 Rationale . 21
Annex A (normative) Security requirements . 22
Bibliography . 85

Figure 1 – Parts of the IEC 62443 Series . 5
Figure 2 – Scope of service provider capabilities . 6

Table 1 – Maturity levels . 15
Table 2 – Columns . 16
Table 3 – Functional area column values . 18
Table 4 – Topic column values . 19
Table 5 – Subtopic column values . 20
Table A.1 – Security program requirements . 22

---------------------- Page: 6 ----------------------
SIST EN IEC 62443-2-4:2019
IEC 62443-2-4:2015 © IEC 2015 – 3 –
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________

SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –

Part 2-4: Security program requirements
for IACS service providers

FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
International Standard IEC 62443-2-4 has been prepared by IEC technical committee 65:
Industrial-process measurement, control and automation.
This publication contains an attached file in the form of an Excel 97-2003 spreadsheet version
of Table A.1. This file is intended to be used as a complement and does not form an integral
part of the publication.
The text of this standard is based on the following documents:
CDV Report on voting
65/545/CDV 65/561A/RVC

Full information on the voting for the approval of this standard can be found in the report on
voting indicated in the above table.

---------------------- Page: 7 ----------------------
SIST EN IEC 62443-2-4:2019
– 4 – IEC 62443-2-4:2015 © IEC 2015
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2.
A list of all parts in the IEC 62443 series, published under the general title Security for
industrial automation and control systems, can be found on the IEC website.
Future standards in this series will carry the new general title as cited above. Titles of existing
standards in this series will be updated at the time of the next edition.
The committee has decided that the contents of this publication will remain unchanged until
the stability date indicated on the IEC web site under "http://webstore.iec.ch" in the data
related to the specific publication. At this date, the publication will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
The contents of the corrigendum of August 2015 have been included in this copy.

IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates
that it contains colours which are considered to be useful for the correct
understanding of its contents. Users should therefore print this document using a
colour printer.

---------------------- Page: 8 ----------------------
SIST EN IEC 62443-2-4:2019
IEC 62443-2-4:2015 © IEC 2015 – 5 –
INTRODUCTION
This standard is the part of the IEC 62443 series that contains security requirements for
providers of integration and maintenance services for Industrial Automation and Control
Systems (IACS). It has been developed by IEC Technical Committee 65 in collaboration with
the International Instrumentation Users Association, referred to as the WIB from its original
and now obsolete Dutch name, and ISA 99 committee members.
Figure 1 illustrates the relationship of the different parts of IEC 62443 being developed. Those
that are normatively referenced are included in the list of normative references in Clause 2,
and those that are referenced for informational purposes or that are in development are listed
in the Bibliography.

IEC 62443-1.1 IEC TR-62443-1.2 IEC 62443-1.3 IEC TR-62443-1.4
Terminology,
Master glossary of System security IACS security
concepts and models
terms and abbreviations compliance metrics lifecycle and use-case
IEC 62443-2.1 IEC TR-62443-2.2 IEC TR-62443-2.3 IEC 62443-2.4
Requirements for an Security program
Implementation guidance
Patch management in
IACS security requirements for
for an IACS security
the IACS environment
management system IACS service providers
management system
IEC TR-62443-3.1 IEC 62443-3.2 IEC 62443-3.3
System security
Security technologies Security levels for
requirements and
for IACS zones and conduits
security levels
IEC 62443-4.1 IEC 62443-4.2
Technical security
Product development
requirements for IACS
requirements
components
IEC

Figure 1 – Parts of the IEC 62443 Series
Policies and
Component System
General
procedures

---------------------- Page: 9 ----------------------
SIST EN IEC 62443-2-4:2019
– 6 – IEC 62443-2-4:2015 © IEC 2015
SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –

Part 2-4: Security program requirements
for IACS service providers



1 Scope
This part of IEC 62443-2-4 specifies requirements for security capabilities for IACS service
providers that they can offer to the asset owner during integration and maintenance activities
of an Automation Solution.
NOTE 1 The term “Automation Solution” is used as a proper noun (and therefore capitalized) in this part of
IEC 62443 to prevent confusion with other uses of this term.
Collectively, the security capabilities offered by an IACS service provider are referred to as its
Security Program. In a related specification, IEC 62443-2-1 describes requirements for the
Security Management System of the asset owner.
NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related.
Figure 2 illustrates how the integration and maintenance capabilities relate to the IACS and
the control system product that is integrated into the Automation Solution. Some of these
capabilities reference security measures defined in IEC 62443-3-3 that the service provider
must ensure are supported in the Automation Solution (either included in the control system
product or separately added to the Automation Solution).
Industrial Automation and Control System (IACS)
Operational and maintenance
Asset
operates
capabilities (policies and
Owner
procedures)
+
Automation Solution
System
integration capabilities
Safety
Basic Process
Integrator Complementary
Instrumented
(design and deployment) Control System
hardware and
System (SIS)
(BPCS)
software
 IACS environment / project specific
Includes a configured instance of the Control System Product
Control System Product as a combination of
Product
develops
Supplier Supporting Embedded Network Host
Applications devices components devices
 Independent of IACS environment
IEC

Figure 2 – Scope of service provider capabilities
In Figure 2, the Automation Solution is illustrated to contain a Basic Process Control System
(BPCS), optional Safety Instrumented System (SIS), and optional supporting applications,
such as advanced control. The dashed boxes indicate that these components are “optional”.

---------------------- Page: 10 ----------------------
SIST EN IEC 62443-2-4:2019
IEC 62443-2-4:2015 © IEC 2015 – 7 –
NOTE 3 The term “process” in BPCS may apply to a variety of industrial processes, including continuous
processes and manufacturing processes.
NOTE 4 Clause 4.1.4 describes profiles and how they can be used by industry groups and other organizations to
adapt this International Standard to their specific environments, including environments not based on an IACS.
NOTE 5 Automation Solutions typically have a single control system (product), but they are not restricted to do
so. In general, the Automation Solution is the set of hardware and software, independent of product packaging, that
is used to control a physical process (e.g. continuous or manufacturing) as defined by the asset owner.
2 Normative references
The following referenced documents are indispensable for the application of this document.
For dated references, only the edition cited applies. For undated references, the latest edition
of the referenced document (including any amendments) applies.
“None”
3 Terms, definitions, abbreviated terms and acronyms
3.1 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1.1
asset owner
individual or organization responsible for one or more IACSs
Note 1 to entry: Used in place of the generic word end user to provide differentiation.
Note 2 to entry: This definition includes the components that are part of the IACS.
Note 3 to entry: In the context of this standard, asset owner also includes the operator of the IACS.
3.1.2
attack surface
physical and functional interfaces of a system that can be accessed and through which the
system can be potentially exploited
Note 1 to entry: The size of the attack surface for a software interface is proportional to the number of methods
and parameters defined for the interface. Simple interfaces, therefore, have smaller attack surfaces than complex
interfaces.
Note 2 to entry: The size of the attack surface and the number of vulnerabilities are not necessarily related to
each other.
3.1.3
Automation Solution
control system and any complementary hardware and software components that have been
installed and configured to operate in an IACS
Note 1 to entry: Automation Solution is used as a proper noun in this part of IEC 62443.
Note 2 to entry: The difference between the control system and the Automation Solution is that the control system
is incorporated into the Automation Solution design (e.g. a specific number of workstations, controllers, and
devices in a specific configuration), which is then implemented. The resulting configuration is referred to as the
Automation Solution.
Note 3 to entry: The Automation Solution may be comprised of components from multiple suppliers, including the
product supplier of the control system.

---------------------- Page: 11 ----------------------
SIST EN IEC 62443-2-4:2019
– 8 – IEC 62443-2-4:2015 © IEC 2015
3.1.4
basic process control system
system that responds to input signals from the process, its associated equipment, other
programmable systems and/or an operator and generates output signals causing the process
and its associated equipment to operate in the desired manner but does not perform any
safety integrated functions (SIF)
Note 1 to entry: Safety instrumented functions are specified in the IEC 61508 series.
Note 2 to entry: The term “process” in this definition may apply to a variety of industrial processes, including
continuous processes and manufacturing processes.
3.1.5
consultant
subcontractor that provides expert advice or guidance to the integration or maintenance
service provider
3.1.6
control system
hardware and software components used in the design and implementation of an IACS
Note 1 to entry: As shown in Figure 2, control systems are composed of field devices, embedded control devices,
network devices, and host devices (including workstations and servers.
Note 2 to entry: As shown in Figure 2, control systems are represented in the Automation Solution by a BPCS and
an optional SIS.
3.1.7
handover
act of turning an Automation Solution over to the asset owner
Note 1 to entry: Handover effectively transfers responsibility for operations and maintenance of an
Automation Solution from the integration service provider to the asset owner and generally occurs after successful
completion of system test, often referred to as Site Acceptance Test (SAT).
3.1.8
industrial automation and control system
collection of personnel, hardware, software, procedures and policies involved in the operation
of the industrial process and that can affect or influence its safe, secure and reliable operation
Note 1 to entry: The IACS may include components that are not installed at the asset owner’s site.
Note 2 to entry: The definition of IACS was taken from in IEC-62443-3-3 and is illustrated in Figure 2. Examples
of IACSs include Distributed Control Systems (DCS) and Supervisory Control and Data Acquisition (SCADA)
systems. IEC 62443-2-4 also defines the proper noun “Solution” to mean the specific instance of the control system
product and possibly additional components that are designed into the IACS. The Automation Solution, therefore,
differs from the control system since it represents a specific implementation (design and configuration) of the
control system hardware and software components for a specific asset owner.
3.1.9
integration service provider
service provider that provides integration activities for an Automation Solution including
design, installation, configuration, testing, commissioning, and handover
Note 1 to entry: Integration service providers are often referred to as integrators or Main Automation Contractors
(MAC).
3.1.10
maintenance service provider
service provider that provides support activities for an Automation Solution after handover
Note 1 to entry: Maintenance is often considered to be distinguished from operation (e.g. in common colloquial
language it is often assumed that an Automation Solution is either in operation or under maintenance).
Maintenance service providers can perform support activities during operations, e.g. managing user accounts,
security monitoring, and security assessments.

---------------------- Page: 12 ----------------------
SIST EN IEC 62443-2-4:2019
IEC 62443-2-4:2015 © IEC 2015 – 9 –
3.1.11
portable media
portable devices that contain data storage capabilities that can be used to physically copy
data from one piece of equipment and transfer it to another
Note 1 to entry: Types of portable media include but are not limited to: CD / DVD / BluRay Media, USB memory
devices, smart phones, flash memory, solid state disks, hard drives, handhelds, and portable computers.
3.1.12
product supplier
manufacturer of hardware and/or software product
Note 1 to entry: Used in place of the generic word vendor to provide differentiation.
3.1.13
remote access
access to a control system through an external interface of the control system
Note 1 to entry: Examples of applications that support remote access include RDP, OPC, and Syslog.
Note 2 to entry: In general, remote access applications and the Automation Solution will reside in different
security zones as determined by the asset owner. See IEC 62443-3-2 for the application of zones and conduits to
the Automation Solution by the asset owner.
3.1.14
safety instrumented system
system used to implement functional safety
Note 1 to entry: See IEC 61508 and IEC 61511 for more information on functional safety.
3.1.15
security compromise
violation of the security of a system such that an unauthorized (1) disclosure or modification
of information or (2) denial of service may have occurred
Note 1 to entry: A security compromise represents a breach of the security of a system or an infraction of its
security policies. It is independent of impact or potential impact to the system.
3.1.16
security incident
security compromise that is of some significance to the asset owner or failed attempt to
compromise the system whose result could have been of some significance to the asset
owner
Note 1 to entry: The term “of some significance’ is relative to the environment in which the security compromise is
detected. For example, the same compromise may be declared as a security incident in one environment and not in
another. Triage activities are often used by asset owners to evaluate security compromises and identify those that
are significant enough to be considered incidents.
Note 2 to entry: In some environments, failed attempts to compromise the system, such as failed login attempts,
are considered significant enough to be classified as security incidents.
3.1.17
security patch
software patch that is relevant to the security of a software component
Note 1 to entry: For the purpose of this definition, firmware is considered software.
Note 2 to entry: Software patches may address known or potential vulnerabilities, or simply improve the security
of the software component, including its reliable operation.
3.1.18
security program
portfolio of security services, including integration services and maintenance services, and
their associated policies,
...

SLOVENSKI STANDARD
SIST EN IEC 62443-2-4:2019
01-november-2019
Zaščita industrijske avtomatizacije in nadzornih sistemov - 2-4. del: Zahteve za
program varnosti zaščite za ponudnike storitev IACS (IEC 62443-2-4:2015)
Security for industrial automation and control systems - Part 2-4: Security program
requirements for IACS service providers (IEC 62443-2-4:2015)
IT-Sicherheit für industrielle Automatisierungssysteme - Teil 2-4: Anforderungen an das
IT-Sicherheitsprogramm von Dienstleistern für industrielle Automatisierungssysteme (IEC
62443-2-4:2015)
Sécurité des automatismes industriels et des systèmes de commande Partie 2-4:
Exigences de programme de sécurité pour les fournisseurs de service IACS (IEC 62443-
2-4:2015)
Ta slovenski standard je istoveten z: EN IEC 62443-2-4:2019
ICS:
25.040.01 Sistemi za avtomatizacijo v Industrial automation
industriji na splošno systems in general
35.030 Informacijska varnost IT Security
SIST EN IEC 62443-2-4:2019 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
EUROPEAN STANDARD EN IEC 62443-2-4

NORME EUROPÉENNE

EUROPÄISCHE NORM
April 2019
ICS 25.040.40; 35.100.05

English Version
Security for industrial automation and control systems - Part 2-4:
Security program requirements for IACS service providers
(IEC 62443-2-4:2015)
Sécurité des automatismes industriels et des systèmes de IT-Sicherheit für industrielle Automatisierungssysteme - Teil
commande - Partie 2-4: Exigences de programme de 2-4: Anforderungen an das IT-Sicherheitsprogramm von
sécurité pour les fournisseurs de service IACS Dienstleistern für industrielle Automatisierungssysteme
(IEC 62443-2-4:2015) (IEC 62443-2-4:2015)
This European Standard was approved by CENELEC on 2019-04-03. CENELEC members are bound to comply with the CEN/CENELEC
Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration.
Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC
Management Centre or to any CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by translation
under the responsibility of a CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the
same status as the official versions.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,
Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia,
Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden,
Switzerland, Turkey and the United Kingdom.


European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2019 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.
 Ref. No. EN IEC 62443-2-4:2019 E

---------------------- Page: 2 ----------------------
EN IEC 62443-2-4:2019 (E)
European foreword
This document (EN IEC 62443-2-4:2019) consists of the text of IEC 62443-2-4:2015 prepared by
IEC/TC 65 "Industrial-process measurement, control and automation".
The following dates are fixed:
• latest date by which the document has to be implemented at national (dop) 2020-04-03
level by publication of an identical national standard or by endorsement
• latest date by which the national standards conflicting with the (dow) 2022-04-03
document have to be withdrawn

Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CENELEC shall not be held responsible for identifying any or all such patent rights.

Endorsement notice
The text of the International Standard IEC 62443-2-4:2015 was approved by CENELEC as a
European Standard without any modification.
In the official version, for Bibliography, the following notes have to be added for the standards
indicated:
IEC 61508 (series) NOTE Harmonized as EN 61508 (series)
IEC 61511 (series) NOTE Harmonized as EN 61511 (series)
IEC 62264-1:2013 NOTE Harmonized as EN 62264-1:2013 (not modified)
IEC 62443-3-3:2013 NOTE Harmonized as EN IEC 62443-3-3:2019 (not modified)
IEC 62443-4-1 NOTE Harmonized as EN IEC 62443-4-1
IEC 62443-4-2 NOTE Harmonized as EN IEC 62443-4-2





2

---------------------- Page: 3 ----------------------
IEC 62443-2-4

®


Edition 1.0 2015-06




INTERNATIONAL



STANDARD




NORME



INTERNATIONALE
colour

inside










Security for industrial automation and control systems –

Part 2-4: Security program requirements for IACS service providers




Sécurité des automatismes industriels et des systèmes de commande –

Partie 2-4: Exigences de programme de sécurité pour les fournisseurs de

service IACS















INTERNATIONAL

ELECTROTECHNICAL

COMMISSION


COMMISSION

ELECTROTECHNIQUE


INTERNATIONALE




ICS 25.040.40; 35.040; 35.100 ISBN 978-2-8322-2767-1



Warning! Make sure that you obtained this publication from an authorized distributor.

Attention! Veuillez vous assurer que vous avez obtenu cette publication via un distributeur agréé.

® Registered trademark of the International Electrotechnical Commission
Marque déposée de la Commission Electrotechnique Internationale

---------------------- Page: 4 ----------------------
– 2 – IEC 62443-2-4:2015 © IEC 2015
CONTENTS
FOREWORD. 3
INTRODUCTION . 5
1 Scope . 6
2 Normative references . 7
3 Terms, definitions, abbreviated terms and acronyms . 7
3.1 Terms and definitions . 7
3.2 Abbreviations . 10
4 Concepts . 11
4.1 Use of IEC 62443-2-4 . 11
4.1.1 Use of IEC 62443-2-4 by IACS service providers . 11
4.1.2 Use of IEC 62443-2-4 by IACS asset owners . 12
4.1.3 Use of IEC 62443-2-4 during negotiations between IACS asset owners
and IACS service providers . 12
4.1.4 Profiles . 12
4.1.5 IACS integration service providers . 13
4.1.6 IACS maintenance service providers . 13
4.2 Maturity model . 14
5 Requirements overview . 15
5.1 Contents . 15
5.2 Sorting and filtering . 15
5.3 IEC 62264-1 hierarchy model . 16
5.4 Requirements table columns . 16
5.5 Column definitions . 16
5.5.1 Req ID column . 16
5.5.2 BR/RE column . 16
5.5.3 Functional area column . 17
5.5.4 Topic column . 18
5.5.5 Subtopic column . 19
5.5.6 Documentation column . 21
5.5.7 Requirement description. 21
5.5.8 Rationale . 21
Annex A (normative) Security requirements . 22
Bibliography . 85

Figure 1 – Parts of the IEC 62443 Series . 5
Figure 2 – Scope of service provider capabilities . 6

Table 1 – Maturity levels . 15
Table 2 – Columns . 16
Table 3 – Functional area column values . 18
Table 4 – Topic column values . 19
Table 5 – Subtopic column values . 20
Table A.1 – Security program requirements . 22

---------------------- Page: 5 ----------------------
IEC 62443-2-4:2015 © IEC 2015 – 3 –
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________

SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –

Part 2-4: Security program requirements
for IACS service providers

FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
International Standard IEC 62443-2-4 has been prepared by IEC technical committee 65:
Industrial-process measurement, control and automation.
This publication contains an attached file in the form of an Excel 97-2003 spreadsheet version
of Table A.1. This file is intended to be used as a complement and does not form an integral
part of the publication.
The text of this standard is based on the following documents:
CDV Report on voting
65/545/CDV 65/561A/RVC

Full information on the voting for the approval of this standard can be found in the report on
voting indicated in the above table.

---------------------- Page: 6 ----------------------
– 4 – IEC 62443-2-4:2015 © IEC 2015
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2.
A list of all parts in the IEC 62443 series, published under the general title Security for
industrial automation and control systems, can be found on the IEC website.
Future standards in this series will carry the new general title as cited above. Titles of existing
standards in this series will be updated at the time of the next edition.
The committee has decided that the contents of this publication will remain unchanged until
the stability date indicated on the IEC web site under "http://webstore.iec.ch" in the data
related to the specific publication. At this date, the publication will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
The contents of the corrigendum of August 2015 have been included in this copy.

IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates
that it contains colours which are considered to be useful for the correct
understanding of its contents. Users should therefore print this document using a
colour printer.

---------------------- Page: 7 ----------------------
IEC 62443-2-4:2015 © IEC 2015 – 5 –
INTRODUCTION
This standard is the part of the IEC 62443 series that contains security requirements for
providers of integration and maintenance services for Industrial Automation and Control
Systems (IACS). It has been developed by IEC Technical Committee 65 in collaboration with
the International Instrumentation Users Association, referred to as the WIB from its original
and now obsolete Dutch name, and ISA 99 committee members.
Figure 1 illustrates the relationship of the different parts of IEC 62443 being developed. Those
that are normatively referenced are included in the list of normative references in Clause 2,
and those that are referenced for informational purposes or that are in development are listed
in the Bibliography.

IEC 62443-1.1 IEC TR-62443-1.2 IEC 62443-1.3 IEC TR-62443-1.4
Terminology,
Master glossary of System security IACS security
concepts and models
terms and abbreviations compliance metrics lifecycle and use-case
IEC 62443-2.1 IEC TR-62443-2.2 IEC TR-62443-2.3 IEC 62443-2.4
Requirements for an Security program
Implementation guidance
Patch management in
IACS security requirements for
for an IACS security
the IACS environment
management system IACS service providers
management system
IEC TR-62443-3.1 IEC 62443-3.2 IEC 62443-3.3
System security
Security technologies Security levels for
requirements and
for IACS zones and conduits
security levels
IEC 62443-4.1 IEC 62443-4.2
Technical security
Product development
requirements for IACS
requirements
components
IEC

Figure 1 – Parts of the IEC 62443 Series
Policies and
Component System
General
procedures

---------------------- Page: 8 ----------------------
– 6 – IEC 62443-2-4:2015 © IEC 2015
SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –

Part 2-4: Security program requirements
for IACS service providers



1 Scope
This part of IEC 62443-2-4 specifies requirements for security capabilities for IACS service
providers that they can offer to the asset owner during integration and maintenance activities
of an Automation Solution.
NOTE 1 The term “Automation Solution” is used as a proper noun (and therefore capitalized) in this part of
IEC 62443 to prevent confusion with other uses of this term.
Collectively, the security capabilities offered by an IACS service provider are referred to as its
Security Program. In a related specification, IEC 62443-2-1 describes requirements for the
Security Management System of the asset owner.
NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related.
Figure 2 illustrates how the integration and maintenance capabilities relate to the IACS and
the control system product that is integrated into the Automation Solution. Some of these
capabilities reference security measures defined in IEC 62443-3-3 that the service provider
must ensure are supported in the Automation Solution (either included in the control system
product or separately added to the Automation Solution).
Industrial Automation and Control System (IACS)
Operational and maintenance
Asset
operates
capabilities (policies and
Owner
procedures)
+
Automation Solution
System
integration capabilities
Safety
Basic Process
Integrator Complementary
Instrumented
(design and deployment) Control System
hardware and
System (SIS)
(BPCS)
software
 IACS environment / project specific
Includes a configured instance of the Control System Product
Control System Product as a combination of
Product
develops
Supplier Supporting Embedded Network Host
Applications devices components devices
 Independent of IACS environment
IEC

Figure 2 – Scope of service provider capabilities
In Figure 2, the Automation Solution is illustrated to contain a Basic Process Control System
(BPCS), optional Safety Instrumented System (SIS), and optional supporting applications,
such as advanced control. The dashed boxes indicate that these components are “optional”.

---------------------- Page: 9 ----------------------
IEC 62443-2-4:2015 © IEC 2015 – 7 –
NOTE 3 The term “process” in BPCS may apply to a variety of industrial processes, including continuous
processes and manufacturing processes.
NOTE 4 Clause 4.1.4 describes profiles and how they can be used by industry groups and other organizations to
adapt this International Standard to their specific environments, including environments not based on an IACS.
NOTE 5 Automation Solutions typically have a single control system (product), but they are not restricted to do
so. In general, the Automation Solution is the set of hardware and software, independent of product packaging, that
is used to control a physical process (e.g. continuous or manufacturing) as defined by the asset owner.
2 Normative references
The following referenced documents are indispensable for the application of this document.
For dated references, only the edition cited applies. For undated references, the latest edition
of the referenced document (including any amendments) applies.
“None”
3 Terms, definitions, abbreviated terms and acronyms
3.1 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1.1
asset owner
individual or organization responsible for one or more IACSs
Note 1 to entry: Used in place of the generic word end user to provide differentiation.
Note 2 to entry: This definition includes the components that are part of the IACS.
Note 3 to entry: In the context of this standard, asset owner also includes the operator of the IACS.
3.1.2
attack surface
physical and functional interfaces of a system that can be accessed and through which the
system can be potentially exploited
Note 1 to entry: The size of the attack surface for a software interface is proportional to the number of methods
and parameters defined for the interface. Simple interfaces, therefore, have smaller attack surfaces than complex
interfaces.
Note 2 to entry: The size of the attack surface and the number of vulnerabilities are not necessarily related to
each other.
3.1.3
Automation Solution
control system and any complementary hardware and software components that have been
installed and configured to operate in an IACS
Note 1 to entry: Automation Solution is used as a proper noun in this part of IEC 62443.
Note 2 to entry: The difference between the control system and the Automation Solution is that the control system
is incorporated into the Automation Solution design (e.g. a specific number of workstations, controllers, and
devices in a specific configuration), which is then implemented. The resulting configuration is referred to as the
Automation Solution.
Note 3 to entry: The Automation Solution may be comprised of components from multiple suppliers, including the
product supplier of the control system.

---------------------- Page: 10 ----------------------
– 8 – IEC 62443-2-4:2015 © IEC 2015
3.1.4
basic process control system
system that responds to input signals from the process, its associated equipment, other
programmable systems and/or an operator and generates output signals causing the process
and its associated equipment to operate in the desired manner but does not perform any
safety integrated functions (SIF)
Note 1 to entry: Safety instrumented functions are specified in the IEC 61508 series.
Note 2 to entry: The term “process” in this definition may apply to a variety of industrial processes, including
continuous processes and manufacturing processes.
3.1.5
consultant
subcontractor that provides expert advice or guidance to the integration or maintenance
service provider
3.1.6
control system
hardware and software components used in the design and implementation of an IACS
Note 1 to entry: As shown in Figure 2, control systems are composed of field devices, embedded control devices,
network devices, and host devices (including workstations and servers.
Note 2 to entry: As shown in Figure 2, control systems are represented in the Automation Solution by a BPCS and
an optional SIS.
3.1.7
handover
act of turning an Automation Solution over to the asset owner
Note 1 to entry: Handover effectively transfers responsibility for operations and maintenance of an
Automation Solution from the integration service provider to the asset owner and generally occurs after successful
completion of system test, often referred to as Site Acceptance Test (SAT).
3.1.8
industrial automation and control system
collection of personnel, hardware, software, procedures and policies involved in the operation
of the industrial process and that can affect or influence its safe, secure and reliable operation
Note 1 to entry: The IACS may include components that are not installed at the asset owner’s site.
Note 2 to entry: The definition of IACS was taken from in IEC-62443-3-3 and is illustrated in Figure 2. Examples
of IACSs include Distributed Control Systems (DCS) and Supervisory Control and Data Acquisition (SCADA)
systems. IEC 62443-2-4 also defines the proper noun “Solution” to mean the specific instance of the control system
product and possibly additional components that are designed into the IACS. The Automation Solution, therefore,
differs from the control system since it represents a specific implementation (design and configuration) of the
control system hardware and software components for a specific asset owner.
3.1.9
integration service provider
service provider that provides integration activities for an Automation Solution including
design, installation, configuration, testing, commissioning, and handover
Note 1 to entry: Integration service providers are often referred to as integrators or Main Automation Contractors
(MAC).
3.1.10
maintenance service provider
service provider that provides support activities for an Automation Solution after handover
Note 1 to entry: Maintenance is often considered to be distinguished from operation (e.g. in common colloquial
language it is often assumed that an Automation Solution is either in operation or under maintenance).
Maintenance service providers can perform support activities during operations, e.g. managing user accounts,
security monitoring, and security assessments.

---------------------- Page: 11 ----------------------
IEC 62443-2-4:2015 © IEC 2015 – 9 –
3.1.11
portable media
portable devices that contain data storage capabilities that can be used to physically copy
data from one piece of equipment and transfer it to another
Note 1 to entry: Types of portable media include but are not limited to: CD / DVD / BluRay Media, USB memory
devices, smart phones, flash memory, solid state disks, hard drives, handhelds, and portable computers.
3.1.12
product supplier
manufacturer of hardware and/or software product
Note 1 to entry: Used in place of the generic word vendor to provide differentiation.
3.1.13
remote access
access to a control system through an external interface of the control system
Note 1 to entry: Examples of applications that support remote access include RDP, OPC, and Syslog.
Note 2 to entry: In general, remote access applications and the Automation Solution will reside in different
security zones as determined by the asset owner. See IEC 62443-3-2 for the application of zones and conduits to
the Automation Solution by the asset owner.
3.1.14
safety instrumented system
system used to implement functional safety
Note 1 to entry: See IEC 61508 and IEC 61511 for more information on functional safety.
3.1.15
security compromise
violation of the security of a system such that an unauthorized (1) disclosure or modification
of information or (2) denial of service may have occurred
Note 1 to entry: A security compromise represents a breach of the security of a system or an infraction of its
security policies. It is independent of impact or potential impact to the system.
3.1.16
security incident
security compromise that is of some significance to the asset owner or failed attempt to
compromise the system whose result could have been of some significance to the asset
owner
Note 1 to entry: The term “of some significance’ is relative to the environment in which the security compromise is
detected. For example, the same compromise may be declared as a security incident in one environment and not in
another. Triage activities are often used by asset owners to evaluate security compromises and identify those that
are significant enough to be considered incidents.
Note 2 to entry: In some environments, failed attempts to compromise the system, such as failed login attempts,
are considered significant enough to be classified as security incidents.
3.1.17
security patch
software patch that is relevant to the security of a software component
Note 1 to entry: For the purpose of this definition, firmware is considered software.
Note 2 to entry: Software patches may address known or potential vulnerabilities, or simply improve the security
of the software component, including its reliable operation.
3.1.18
security program
portfolio of security services, including integration services and maintenance services, and
their associated policies, procedures, and products that are applicable to the IACS

---------------------- Page: 12 ----------------------
– 10 – IEC 62443-2-4:2015 © IEC 2015
Note 1 to entry: The security program for IACS service providers refers to the policies and procedures defined by
them to address security concerns of the IACS.
3.1.19
service provider
individual or organization (internal or external organi
...

SLOVENSKI STANDARD
oSIST prEN 62443-2-4:2019
01-januar-2019
=DãþLWDLQGXVWULMVNHDYWRPDWL]DFLMHLQQDG]RUQLKVLVWHPRYGHO=DKWHYH]D
SURJUDPYDUQRVWL]DSRQXGQLNHVWRULWHY,$&6
Security for industrial automation and control systems - Part 2-4: Security program
requirements for IACS service providers
IT-Sicherheit für industrielle Automatisierungssysteme - Teil 2-4: Anforderungen an das
IT-Sicherheitsprogramm von Dienstleistern für industrielle Automatisierungssysteme
6pFXULWpGHVDXWRPDWLVPHVLQGXVWULHOVHWGHVV\VWqPHVGHFRPPDQGH3DUWLH
([LJHQFHVGHSURJUDPPHGHVpFXULWpSRXUOHVIRXUQLVVHXUVGHVHUYLFH,$&6
Ta slovenski standard je istoveten z: prEN 62443-2-4
ICS:
25.040.01 Sistemi za avtomatizacijo v Industrial automation
industriji na splošno systems in general
35.030 Informacijska varnost IT Security
oSIST prEN 62443-2-4:2019 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
oSIST prEN 62443-2-4:2019

---------------------- Page: 2 ----------------------
oSIST prEN 62443-2-4:2019


EUROPEAN STANDARD DRAFT
prEN 62443-2-4
NORME EUROPÉENNE

EUROPÄISCHE NORM

November 2018
ICS

English Version
Security for industrial automation and control systems - Part 2-4:
Security program requirements for IACS service providers
(IEC 62443-2-4:2015)
Sécurité des automatismes industriels et des systèmes de IT-Sicherheit für industrielle Automatisierungssysteme - Teil
commande ¿ Partie 2-4: Exigences de programme de 2-4: Anforderungen an das IT-Sicherheitsprogramm von
sécurité pour les fournisseurs de service IACS Dienstleistern für industrielle Automatisierungssysteme
(IEC 62443-2-4:2015) (IEC 62443-2-4:2015)
This draft European Standard is submitted to CENELEC members for enquiry.
Deadline for CENELEC: 2019-02-08.

The text of this draft consists of the text of IEC 62443-2-4:2015.

If this draft becomes a European Standard, CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which
stipulate the conditions for giving this European Standard the status of a national standard without any alteration.

This draft European Standard was established by CENELEC in three official versions (English, French, German).
A version in any other language made by translation under the responsibility of a CENELEC member into its own language and notified to
the CEN-CENELEC Management Centre has the same status as the official versions.

CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,
Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia,
Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden,
Switzerland, Turkey and the United Kingdom.

Recipients of this draft are invited to submit, with their comments, notification of any relevant patent rights of which they are aware and to
provide supporting documentation.

Warning : This document is not a European Standard. It is distributed for review and comments. It is subject to change without notice and
shall not be referred to as a European Standard.


European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2018 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.
Project: 66772 Ref. No. prEN 62443-2-4 E

---------------------- Page: 3 ----------------------
oSIST prEN 62443-2-4:2019
prEN 62443-2-4:2018 (E)

European foreword
This document (prEN 62443-2-4:2018) consists of the text of IEC 62443-2-4:2015 prepared by
IEC/TC 65 "Industrial-process measurement, control and automation".
This document is currently submitted to the Enquiry.
The following dates are proposed:
• latest date by which the existence of (doa) dor + 6 months
this document has to be announced at national
level
• latest date by which this document has to be (dop) dor + 12 months
implemented at national level by publication of an
identical national standard or by endorsement
• latest date by which the national standards (dow) dor + 36 months
conflicting with this document have to be (to be confirmed or
withdrawn modified when voting)

---------------------- Page: 4 ----------------------
oSIST prEN 62443-2-4:2019

---------------------- Page: 5 ----------------------
oSIST prEN 62443-2-4:2019




IEC 62443-2-4

®


Edition 1.0 2015-06




INTERNATIONAL



STANDARD




NORME



INTERNATIONALE
colour

inside










Security for industrial automation and control systems –

Part 2-4: Security program requirements for IACS service providers




Sécurité des automatismes industriels et des systèmes de commande –

Partie 2-4: Exigences de programme de sécurité pour les fournisseurs de

service IACS















INTERNATIONAL

ELECTROTECHNICAL

COMMISSION


COMMISSION

ELECTROTECHNIQUE


INTERNATIONALE




ICS 25.040.40; 35.040; 35.100 ISBN 978-2-8322-2767-1



Warning! Make sure that you obtained this publication from an authorized distributor.

Attention! Veuillez vous assurer que vous avez obtenu cette publication via un distributeur agréé.

® Registered trademark of the International Electrotechnical Commission
Marque déposée de la Commission Electrotechnique Internationale

---------------------- Page: 6 ----------------------
oSIST prEN 62443-2-4:2019
– 2 – IEC 62443-2-4:2015 © IEC 2015
CONTENTS
FOREWORD. 3
INTRODUCTION . 5
1 Scope . 6
2 Normative references . 7
3 Terms, definitions, abbreviated terms and acronyms . 7
3.1 Terms and definitions . 7
3.2 Abbreviations . 10
4 Concepts . 11
4.1 Use of IEC 62443-2-4 . 11
4.1.1 Use of IEC 62443-2-4 by IACS service providers . 11
4.1.2 Use of IEC 62443-2-4 by IACS asset owners . 12
4.1.3 Use of IEC 62443-2-4 during negotiations between IACS asset owners
and IACS service providers . 12
4.1.4 Profiles . 12
4.1.5 IACS integration service providers . 13
4.1.6 IACS maintenance service providers . 13
4.2 Maturity model . 14
5 Requirements overview . 15
5.1 Contents . 15
5.2 Sorting and filtering . 15
5.3 IEC 62264-1 hierarchy model . 16
5.4 Requirements table columns . 16
5.5 Column definitions . 16
5.5.1 Req ID column . 16
5.5.2 BR/RE column . 16
5.5.3 Functional area column . 17
5.5.4 Topic column . 18
5.5.5 Subtopic column . 19
5.5.6 Documentation column . 21
5.5.7 Requirement description. 21
5.5.8 Rationale . 21
Annex A (normative) Security requirements . 22
Bibliography . 85

Figure 1 – Parts of the IEC 62443 Series . 5
Figure 2 – Scope of service provider capabilities . 6

Table 1 – Maturity levels . 15
Table 2 – Columns . 16
Table 3 – Functional area column values . 18
Table 4 – Topic column values . 19
Table 5 – Subtopic column values . 20
Table A.1 – Security program requirements . 22

---------------------- Page: 7 ----------------------
oSIST prEN 62443-2-4:2019
IEC 62443-2-4:2015 © IEC 2015 – 3 –
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________

SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –

Part 2-4: Security program requirements
for IACS service providers

FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
International Standard IEC 62443-2-4 has been prepared by IEC technical committee 65:
Industrial-process measurement, control and automation.
This publication contains an attached file in the form of an Excel 97-2003 spreadsheet version
of Table A.1. This file is intended to be used as a complement and does not form an integral
part of the publication.
The text of this standard is based on the following documents:
CDV Report on voting
65/545/CDV 65/561A/RVC

Full information on the voting for the approval of this standard can be found in the report on
voting indicated in the above table.

---------------------- Page: 8 ----------------------
oSIST prEN 62443-2-4:2019
– 4 – IEC 62443-2-4:2015 © IEC 2015
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2.
A list of all parts in the IEC 62443 series, published under the general title Security for
industrial automation and control systems, can be found on the IEC website.
Future standards in this series will carry the new general title as cited above. Titles of existing
standards in this series will be updated at the time of the next edition.
The committee has decided that the contents of this publication will remain unchanged until
the stability date indicated on the IEC web site under "http://webstore.iec.ch" in the data
related to the specific publication. At this date, the publication will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
The contents of the corrigendum of August 2015 have been included in this copy.

IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates
that it contains colours which are considered to be useful for the correct
understanding of its contents. Users should therefore print this document using a
colour printer.

---------------------- Page: 9 ----------------------
oSIST prEN 62443-2-4:2019
IEC 62443-2-4:2015 © IEC 2015 – 5 –
INTRODUCTION
This standard is the part of the IEC 62443 series that contains security requirements for
providers of integration and maintenance services for Industrial Automation and Control
Systems (IACS). It has been developed by IEC Technical Committee 65 in collaboration with
the International Instrumentation Users Association, referred to as the WIB from its original
and now obsolete Dutch name, and ISA 99 committee members.
Figure 1 illustrates the relationship of the different parts of IEC 62443 being developed. Those
that are normatively referenced are included in the list of normative references in Clause 2,
and those that are referenced for informational purposes or that are in development are listed
in the Bibliography.

IEC 62443-1.1 IEC TR-62443-1.2 IEC 62443-1.3 IEC TR-62443-1.4
Terminology,
Master glossary of System security IACS security
concepts and models
terms and abbreviations compliance metrics lifecycle and use-case
IEC 62443-2.1 IEC TR-62443-2.2 IEC TR-62443-2.3 IEC 62443-2.4
Requirements for an Security program
Implementation guidance
Patch management in
IACS security requirements for
for an IACS security
the IACS environment
management system IACS service providers
management system
IEC TR-62443-3.1 IEC 62443-3.2 IEC 62443-3.3
System security
Security technologies Security levels for
requirements and
for IACS zones and conduits
security levels
IEC 62443-4.1 IEC 62443-4.2
Technical security
Product development
requirements for IACS
requirements
components
IEC

Figure 1 – Parts of the IEC 62443 Series
Policies and
Component System
General
procedures

---------------------- Page: 10 ----------------------
oSIST prEN 62443-2-4:2019
– 6 – IEC 62443-2-4:2015 © IEC 2015
SECURITY FOR INDUSTRIAL AUTOMATION
AND CONTROL SYSTEMS –

Part 2-4: Security program requirements
for IACS service providers



1 Scope
This part of IEC 62443-2-4 specifies requirements for security capabilities for IACS service
providers that they can offer to the asset owner during integration and maintenance activities
of an Automation Solution.
NOTE 1 The term “Automation Solution” is used as a proper noun (and therefore capitalized) in this part of
IEC 62443 to prevent confusion with other uses of this term.
Collectively, the security capabilities offered by an IACS service provider are referred to as its
Security Program. In a related specification, IEC 62443-2-1 describes requirements for the
Security Management System of the asset owner.
NOTE 2 In general, these security capabilities are policy, procedure, practice and personnel related.
Figure 2 illustrates how the integration and maintenance capabilities relate to the IACS and
the control system product that is integrated into the Automation Solution. Some of these
capabilities reference security measures defined in IEC 62443-3-3 that the service provider
must ensure are supported in the Automation Solution (either included in the control system
product or separately added to the Automation Solution).
Industrial Automation and Control System (IACS)
Operational and maintenance
Asset
operates
capabilities (policies and
Owner
procedures)
+
Automation Solution
System
integration capabilities
Safety
Basic Process
Integrator Complementary
Instrumented
(design and deployment) Control System
hardware and
System (SIS)
(BPCS)
software
 IACS environment / project specific
Includes a configured instance of the Control System Product
Control System Product as a combination of
Product
develops
Supplier Supporting Embedded Network Host
Applications devices components devices
 Independent of IACS environment
IEC

Figure 2 – Scope of service provider capabilities
In Figure 2, the Automation Solution is illustrated to contain a Basic Process Control System
(BPCS), optional Safety Instrumented System (SIS), and optional supporting applications,
such as advanced control. The dashed boxes indicate that these components are “optional”.

---------------------- Page: 11 ----------------------
oSIST prEN 62443-2-4:2019
IEC 62443-2-4:2015 © IEC 2015 – 7 –
NOTE 3 The term “process” in BPCS may apply to a variety of industrial processes, including continuous
processes and manufacturing processes.
NOTE 4 Clause 4.1.4 describes profiles and how they can be used by industry groups and other organizations to
adapt this International Standard to their specific environments, including environments not based on an IACS.
NOTE 5 Automation Solutions typically have a single control system (product), but they are not restricted to do
so. In general, the Automation Solution is the set of hardware and software, independent of product packaging, that
is used to control a physical process (e.g. continuous or manufacturing) as defined by the asset owner.
2 Normative references
The following referenced documents are indispensable for the application of this document.
For dated references, only the edition cited applies. For undated references, the latest edition
of the referenced document (including any amendments) applies.
“None”
3 Terms, definitions, abbreviated terms and acronyms
3.1 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1.1
asset owner
individual or organization responsible for one or more IACSs
Note 1 to entry: Used in place of the generic word end user to provide differentiation.
Note 2 to entry: This definition includes the components that are part of the IACS.
Note 3 to entry: In the context of this standard, asset owner also includes the operator of the IACS.
3.1.2
attack surface
physical and functional interfaces of a system that can be accessed and through which the
system can be potentially exploited
Note 1 to entry: The size of the attack surface for a software interface is proportional to the number of methods
and parameters defined for the interface. Simple interfaces, therefore, have smaller attack surfaces than complex
interfaces.
Note 2 to entry: The size of the attack surface and the number of vulnerabilities are not necessarily related to
each other.
3.1.3
Automation Solution
control system and any complementary hardware and software components that have been
installed and configured to operate in an IACS
Note 1 to entry: Automation Solution is used as a proper noun in this part of IEC 62443.
Note 2 to entry: The difference between the control system and the Automation Solution is that the control system
is incorporated into the Automation Solution design (e.g. a specific number of workstations, controllers, and
devices in a specific configuration), which is then implemented. The resulting configuration is referred to as the
Automation Solution.
Note 3 to entry: The Automation Solution may be comprised of components from multiple suppliers, including the
product supplier of the control system.

---------------------- Page: 12 ----------------------
oSIST prEN 62443-2-4:2019
– 8 – IEC 62443-2-4:2015 © IEC 2015
3.1.4
basic process control system
system that responds to input signals from the process, its associated equipment, other
programmable systems and/or an operator and generates output signals causing the process
and its associated equipment to operate in the desired manner but does not perform any
safety integrated functions (SIF)
Note 1 to entry: Safety instrumented functions are specified in the IEC 61508 series.
Note 2 to entry: The term “process” in this definition may apply to a variety of industrial processes, including
continuous processes and manufacturing processes.
3.1.5
consultant
subcontractor that provides expert advice or guidance to the integration or maintenance
service provider
3.1.6
control system
hardware and software components used in the design and implementation of an IACS
Note 1 to entry: As shown in Figure 2, control systems are composed of field devices, embedded control devices,
network devices, and host devices (including workstations and servers.
Note 2 to entry: As shown in Figure 2, control systems are represented in the Automation Solution by a BPCS and
an optional SIS.
3.1.7
handover
act of turning an Automation Solution over to the asset owner
Note 1 to entry: Handover effectively transfers responsibility for operations and maintenance of an
Automation Solution from the integration service provider to the asset owner and generally occurs after successful
completion of system test, often referred to as Site Acceptance Test (SAT).
3.1.8
industrial automation and control system
collection of personnel, hardware, software, procedures and policies involved in the operation
of the industrial process and that can affect or influence its safe, secure and reliable operation
Note 1 to entry: The IACS may include components that are not installed at the asset owner’s site.
Note 2 to entry: The definition of IACS was taken from in IEC-62443-3-3 and is illustrated in Figure 2. Examples
of IACSs include Distributed Control Systems (DCS) and Supervisory Control and Data Acquisition (SCADA)
systems. IEC 62443-2-4 also defines the proper noun “Solution” to mean the specific instance of the control system
product and possibly additional components that are designed into the IACS. The Automation Solution, therefore,
differs from the control system since it represents a specific implementation (design and configuration) of the
control system hardware and software components for a specific asset owner.
3.1.9
integration service provider
service provider that provides integration activities for an Automation Solution including
design, installation, configuration, testing, commissioning, and handover
Note 1 to entry: Integration service providers are often referred to as integrators or Main Automation Contractors
(MAC).
3.1.10
maintenance service provider
service provider that provides support activities for an Automation Solution after handover
Note 1 to entry: Maintenance is often considered to be distinguished from operation (e.g. in common colloquial
language it is often assumed that an Automation Solution is either in operation or under maintenance).
Maintenance service providers can perform support activities during operations, e.g. managing user accounts,
security monitoring, and security assessments.

---------------------- Page: 13 ----------------------
oSIST prEN 62443-2-4:2019
IEC 62443-2-4:2015 © IEC 2015 – 9 –
3.1.11
portable media
portable devices that contain data storage capabilities that can be used to physically copy
data from one piece of equipment and transfer it to another
Note 1 to entry: Types of portable media include but are not limited to: CD / DVD / BluRay Media, USB memory
devices, smart phones, flash memory, solid state disks, hard drives, handhelds, and portable computers.
3.1.12
product supplier
manufacturer of hardware and/or software product
Note 1 to entry: Used in place of the generic word vendor to provide differentiation.
3.1.13
remote access
access to a control system through an external interface of the control system
Note 1 to entry: Examples of applications that support remote access include RDP, OPC, and Syslog.
Note 2 to entry: In general, remote access applications and the Automation Solution will reside in different
security zones as determined by the asset owner. See IEC 62443-3-2 for the application of zones and conduits to
the Automation Solution by the asset owner.
3.1.14
safety instrumented system
system used to implement functional safety
Note 1 to entry: See IEC 61508 and IEC 61511 for more information on functional safety.
3.1.15
security compromise
violation of the security of a system such that an unauthorized (1) disclosure or modification
of information or (2) denial of service may have occurred
Note 1 to entry: A security compromise represents a breach of the security of a system or an infraction of its
security policies. It is independent of impact or potential impact to the system.
3.1.16
security incident
security compromise that is of some significance to the asset owner or failed attempt to
compromise the system whose result could have been of some significance to the asset
owner
Note 1 to entry: The term “of some significance’ is relative to the environment in which the security compromise is
detected. For example, the same compromise may be declared as a security incident in one environment and not in
another. Triage activities are often used by asset owners to evaluate security compromises and identify those that
are significant enough to be considered incidents.
Note 2 to entry: In some environments, failed attempts to compromise the system, such as failed login attempts,
are considered significant enough to be classified as security incidents.
3.1.17
security patch
software patch that is relevant to the security of a software component
Note 1 to entry: For the purpose of this definition, firmware is considered software.
Note 2 to entry: Software patches may address known or potential vulnerabilities, or simply improve the security
of the software component, including its reliable operation.
3.1.18
security program
portfolio of security services, including integration services and maintenance services, and
their associated policies, procedures, and products that are applicable to the IACS

---------------------- Page: 14 ----------------------
oSIST prEN 62443-2-4:2019
– 10 – IEC 62443-2-4:2015 © IEC 2015
Note 1 to entry: The security program for IACS service providers refers to the policies and pro
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.