logo

Database

ISA/IEC 62443

Last updated: 2023/09/18
logo

The ISA/IEC 62443 standard defines the necessary elements to establish a cyber security management system (CSMS) for industrial automation and control systems (IACS) and provides guidance on how to develop those elements. The version used in this section is IEC 62443-3-3 edition 1.0 2013-08.

Control-Requirement Mapping

DefinitionRequirements
IAC-1_1. Human user identification and authentication
IAC-1_2. Software process and device identification and authentication
IAC-1_3. Account management
IAC-1_5. Authenticator management
IAC-1_6. Wireless access management
IAC-1_7. Strength of password-based authentication
IAC-1_8. Public key infrastructure (PKI) certificates
IAC-1_9. Strength of public key authentication
IAC-1_11. Unsuccessful login attempts
IAC-1_12. System use notification
IAC-1_13. Access via untrusted networks
UC-2_1. Authorization enforcement
UC-2_2. Wireless use control
UC-2_3. Use control for portable and mobile devices
UC-2_4. Mobile code
UC-2_6. Remote session termination
UC-2_7. Concurrent session control
UC-2_8. Auditable events
UC-2_9. Audit storage capacity
UC-2_11. Timestamps
SI-3_1. Communication integrity
SI-3_2. Malicious code protection
SI-3_5. Input validation
SI-3_7. Error handling
SI-3_8. Session integrity
SI-3_9. Protection of audit information
DC-4_1. Information confidentiality
DC-4_3. Use of cryptography
RDF-5_1. Network segmentation
RDF-5_2. Zone boundary protection
RDF-5_3. User content filtering
TRE-6_1. Audit log accessibility
RA-7_1. Denial of service protection
RA-7_6. Network and security configuration settings
RA-7_7. Least functionality
CR-1_1-RE_1. Unique identification and authentication
CR-1_1-RE_2. Multifactor authentication for all interfaces
CR-1_7. Strength of password-based authentication
CR-1_7-RE_2. Password lifetime restrictions for all users
CR-2_1-RE_3. Permission mapping to roles
CR-3_1-RE_1. Communication authentication