Skip to main content

IEC 62443 – Operational Technology (OT) Security

1. Why IEC 62443 matters now

The IEC 62443 series, developed in partnership with the International Society of Automation (ISA), is the leading international standard for the cybersecurity of Industrial Automation and Control Systems (IACS), commonly known as Operational Technology (OT). Unlike general IT security standards, it is specifically designed to address the unique safety, reliability, and performance requirements of industrial environments like manufacturing plants, power grids, and transportation systems.

The standard provides a role-based framework that methodically addresses security throughout the entire lifecycle, defining processes and requirements for all three key stakeholders in the industrial ecosystem:

  • Asset Owners (the operators of the industrial facility)
  • System Integrators (the companies that design and build the control systems)
  • Product Suppliers (the manufacturers of hardware and software components)

While compliance with IEC 62443 is voluntary, its comprehensive, risk-based approach provides a crucial pathway for meeting the mandatory requirements of new EU legislation, establishing a globally recognized benchmark for industrial cybersecurity.

Official Texts

The IEC 62443 documents are a commercial standard and are not available for free. They must be purchased from the IEC Webstore or an authorized national standards body (e.g., ANSI, BSI, DIN).

Implementation Guidance

The ISA Global Cybersecurity Alliance (ISAGCA), in partnership with ISACA, has published a detailed quick-start guide that provides an excellent overview of the standards, their structure, and their application.

Advanced Guidance for IIoT

For manufacturers of IIoT devices, the ISAGCA has published a detailed study on adapting the standard for IIoT-specific challenges. It outlines an enhanced certification profile for components with direct internet connectivity.

Relationship to EU law

LawHow it interacts with IEC 62443
Cyber-Resilience Act (CRA)For manufacturers of industrial devices (e.g., PLCs, industrial firewalls, gateways), implementing the processes in IEC 62443-4-1 (Secure Development Lifecycle) and the technical controls in IEC 62443-4-2 (Technical Security Requirements for IACS Components) is the most direct way to prove compliance with the CRA's essential requirements. Many industrial products are classified as "Important" (Class I or II) under the CRA, making a robust, auditable security framework like 62443 essential.
NIS 2 DirectiveFor asset owners in critical sectors (energy, water, transport, etc.), the NIS 2 Directive mandates organisational cyber risk management. Applying the risk assessment, system design, and policy requirements from the IEC 62443-2-x and IEC 62443-3-x parts of the standard provides a clear methodology for securing their industrial operations and demonstrating compliance to national authorities.

2. Structure of the Standard

The IEC 62443 series is organized into four main groups of documents, each targeting a different audience or aspect of industrial security. Documents marked with "TR" are Technical Reports that provide information and guidance, while those marked "IS" are International Standards containing normative requirements.

  • General (62443-1-x): Foundational concepts, models, and terminology.

  • Policies & Procedures (62443-2-x): Focus on the Asset Owner's security program.

    • 62443-2-1: Establishing an IACS Security Program
    • TR 62443-2-3: Patch Management in the IACS Environment
    • 62443-2-4: Security Program Requirements for IACS Service Providers
  • System (62443-3-x): Guidance for System Integrators on secure system design.

    • TR 62443-3-1: Security Technologies for IACS
    • 62443-3-2: Security Risk Assessment for System Design
    • 62443-3-3: System Security Requirements and Security Levels
  • Component (62443-4-x): Requirements for manufacturers of IACS components.

    • 62443-4-1: Secure Product Development Lifecycle Requirements
    • 62443-4-2: Technical Security Requirements for IACS Components

3. Key Concepts

To effectively use the standard, it's important to understand its core concepts:

  • Zones & Conduits: A foundational principle of the standard is to partition the system under consideration into logical Zones of assets that share common security requirements. These zones are connected by Conduits, which are communication channels that also have defined security properties. This segmentation limits the impact of a security breach. For modern IIoT components, this model is also applied within a device to create secure, compartmentalized execution environments for different functions (IIoT Component Certification Study § 4.3.4).
  • Foundational Requirements (FRs): The standard defines seven FRs that form the basis for all technical security requirements in IEC 62443-1-1. These are: Identification and Authentication Control (IAC), Use Control (UC), System Integrity (SI), Data Confidentiality (DC), Restricted Data Flow (RDF), Timely Response to Events (TRE), and Resource Availability (RA).
  • Security Levels (SLs): A key innovation of the series is the use of Security Levels to specify the required security robustness. There are four levels, from SL 1 (protection against casual or coincidental violation) to SL 4 (protection against nation-state-level attacks). A system must achieve a Target Security Level (SL-T) defined by the asset owner's risk assessment.
  • Maturity Levels: While SLs measure the technical robustness of a system, Maturity Levels are used in IEC 62443-4-1 to measure how well security processes (like secure development or patch management) are defined, practiced, and optimized. Based on the CMMI model, they provide a benchmark for assessing a supplier's development practices:
    • Level 1 (Initial): Processes are ad-hoc and undocumented.
    • Level 2 (Managed): Processes are documented as written policies, but may not have been fully practiced yet.
    • Level 3 (Defined/Practiced): Documented processes have been demonstrably practiced and are repeatable across the organization.
    • Level 4 (Improving): The organization uses metrics to control the effectiveness of its processes and demonstrates continuous improvement.

4. A Role-Based Implementation

The standard defines clear responsibilities for each stakeholder in the IACS ecosystem.

4.1 For Product Suppliers

To help manufacturers map their obligations between key regulations, this section organizes the requirements from both IEC 62443-4-1 (Secure Process) and IEC 62443-4-2 (Secure Product) into a structure that aligns with the key themes of the EU's Cyber Resilience Act.

4.1.1 Risk Assessment & Threat Modeling

Both frameworks mandate a proactive approach to identifying and mitigating risks early in the development lifecycle. This begins with understanding the product's context and performing a systematic threat analysis to inform all subsequent security work.

ObligationsEngineering TasksImplementation Guides
Risk-Based Requirements
SR 1-5
Define the product's security context, perform a systematic threat model, and derive and document comprehensive security requirements. This includes specifying the product's scope, boundaries, and target Security Level (SL-C). All requirements must be formally reviewed and approved.User Documentation Guide
Threat Modeling

4.1.2 Product Security

A secure process must result in a secure product. This involves implementing security throughout the design and coding phases, verifying its effectiveness through rigorous testing, and building in the core technical capabilities required by the standard.

Obligations from IEC 62443-4-1 (Process)Engineering TasksImplementation Guides
Secure Design
SD 1-4
Develop a formal, documented secure design that implements a defense-in-depth architecture. This includes characterizing all product interfaces, applying secure design principles like least privilege and attack surface reduction, and conducting formal security design reviews to verify that all threats from the threat model are mitigated.Secure Configuration & Hardening
Secure Implementation
SI 1, 2
Enforce secure coding standards and conduct rigorous implementation reviews using a combination of static analysis and manual peer review to identify vulnerabilities and deviations from the secure design.Static & Dynamic Analysis

The IEC 62443-4-2 standard specifies the technical security capabilities that a secure component must possess. These capabilities are the direct result of a secure design, implementation, and verification process.

Capabilities from IEC 62443-4-2 (Product)Engineering TasksImplementation Guides
Identification & Authentication Control
IAC
CRs 1.1-1.5, 1.7-1.12, 1.14
NDRs 1.6, 1.13
Control and audit access by uniquely identifying and authenticating all users (humans, processes, devices). This includes the secure management of accounts and authenticators (e.g., passwords, keys, certificates), including their initial state, lifecycle, protection in storage and transit, and policies for handling unsuccessful login attempts. Key capabilities include multi-factor authentication and strong password enforcement.Unique Device Identity
Use Control
UC
CRs 2.1-2.13
SAR 2.4
EDRs 2.4, 2.13
HDRs 2.4, 2.13
NDRs 2.4, 2.13
Enforce assigned privileges for authenticated users according to the principle of least privilege. This includes robust authorization based on roles, secure session management (locking, termination, concurrent control), and the generation of a comprehensive, timestamped audit trail for all security-relevant events, with protection for audit log storage and defined behavior on audit failures.Security Logging & Monitoring
System Integrity
SI
CRs 3.1-3.14
EDRs 3.2, 3.10-3.14
HDRs 3.10
NDRs 3.2, 3.10
Protect the integrity of the component and its data from unauthorized modification. This is achieved through a wide range of functions, including protection from malicious code, communication integrity, self-tests of security functions, input validation, secure error handling, session integrity, audit log protection, secure boot, signed updates, physical tamper resistance, and secure provisioning of roots of trust.Secure Boot
Secure OTA Updates
Key Provisioning & Storage
Data Confidentiality
DC
CRs 4.1-4.3
Prevent the unauthorized disclosure of information. This requires protecting data at rest and data in transit using strong, standardized cryptographic protocols like TLS, and ensuring that sensitive information can be securely deleted when no longer needed (information persistence).Key Provisioning & Storage
Data Privacy & Secure Deletion
Restricted Data Flow
RDF
CRs 5.1-5.4
Control the flow of data between different network zones and between applications on the same device. This is a primary method of network defense, limiting the lateral spread of an attack by enforcing rules on traffic at zone boundaries (e.g., via a firewall) and supporting application partitioning.Secure Configuration & Hardening
Resource Availability
RA
CRs 7.1-7.4, 7.6-7.8
EDRs 7.1, 7.7, 7.8
HDRs 7.1
NDRs 7.1
Ensure the component is resilient against denial-of-service attacks. This includes robust resource management, the ability to be backed up and restored, secure management of all configuration settings, providing a component inventory, and minimizing the attack surface by disabling all unnecessary functions, ports, and services.Secure Configuration & Hardening

4.1.3 Vulnerability Handling

A manufacturer's responsibility does not end at shipment. Both frameworks require robust processes for managing vulnerabilities and delivering security updates throughout the product's supported lifecycle. This includes not only fixing flaws but proactively searching for them and ensuring the product has the technical means to report events.

Obligations from IEC 62443-4-1 (Process)Engineering TasksImplementation Guides
Defect & Update Management
DM 1-6; SUM 1-5
Establish a formal process for vulnerability intake, triage, and disclosure, which is periodically reviewed for effectiveness. Maintain a secure mechanism for delivering qualified, documented, and timely cryptographically signed security updates to end-users.Vulnerability Disclosure
Secure OTA Updates
Patch Cadence
Security Verification & Validation
SVV 1-5
Conduct a comprehensive suite of tests—performed by a team independent of the developers—including functional security testing, threat mitigation validation, fuzzing, software composition analysis, and penetration testing to proactively discover and eliminate vulnerabilities.Static & Dynamic Analysis

A key part of vulnerability handling is ensuring the product has the built-in technical capability to detect and report security events.

Capabilities from IEC 62443-4-2 (Product)Engineering TasksImplementation Guides
Timely Response to Events
TRE
CRs 6.1, 6.2
Respond to security violations in a timely manner. Components must have the capability to be monitored for security events and must make their audit logs securely available for analysis.Security Logging & Monitoring

4.1.4 Other Key Obligations

This section covers the remaining governance and documentation-related duties required for a compliant secure development process.

ObligationsEngineering TasksImplementation Guides
Security Management
SM 1-13
Establish a comprehensive SDL, defining its scope, assigning roles, and ensuring personnel expertise. The process must secure the development environment and private keys, manage supply chain risks, track all security issues to closure, verify process completion before release, provide integrity-protected deliverables, and be subject to continuous improvement.SBOM & VEX Workflows
CI/CD Hardening
Key Provisioning & Storage
Security Guidelines
SG 1-7
Create and maintain comprehensive, reviewed security documentation for end-users. This must cover the product's security features, hardening procedures, expected environmental controls, and instructions for secure operation, account management, and disposal.User Documentation Guide
Secure Configuration & Hardening
Data Privacy & Secure Deletion

4.2 For Asset Owners (Operators)

The asset owner is ultimately accountable for the secure operation of the IACS. Their responsibilities are primarily defined in the 62443-2-x series.

ObligationsEngineering TasksImplementation Guides
Establish Security Program
IEC 62443-2-1
Define, implement, and continuously maintain a comprehensive IACS Cybersecurity Management System (CSMS). This program must establish a risk-management framework, define clear security policies and procedures, assign roles and responsibilities, and include a robust incident response plan.Security Program Development
Perform Risk Assessment
IEC 62443-3-2
Systematically partition the entire IACS into logical zones and conduits. For each, conduct a detailed cybersecurity risk assessment to identify vulnerabilities, assess potential impacts, and determine the required Target Security Level (SL-T) for all assets.Threat Modeling
Operate & Maintain Securely
IEC 62443-2-3
Implement and document rigorous processes for the ongoing secure operation of the IACS. This includes timely Patch Management as guided by TR 62443-2-3, proactive Incident Response, and regular Program Audits as mandated by the CSMS (IEC 62443-2-1).Patch Cadence

4.3 For System Integrators & Service Providers

System integrators are responsible for designing and building a secure automation solution that meets the asset owner's requirements. Their duties are covered in the 62443-2-4 and 62443-3-x documents.

ObligationsEngineering TasksImplementation Guides
Secure Integration Process
IEC 62443-2-4
Adhere to a defined and documented security program for the delivery of IACS solutions. This requires demonstrating robust capabilities for secure solution design, installation, commissioning, ongoing maintenance, secure remote access, and incident management.Secure Integration Practices
Secure System Design
IEC 62443-3-3
Design and engineer the integrated IACS to meet the asset owner's specified Target Security Levels (SL-T). This involves correctly applying the seven Foundational Requirements (FRs) at the system level, selecting and integrating components with the appropriate Security Level capabilities (SL-C), and implementing compensating countermeasures to address any identified gaps.Secure Configuration & Hardening

5. Certification & Conformity

Unlike regulatory frameworks that may allow self-assessment, demonstrating conformity with the IEC 62443 series typically involves formal, third-party certification. The premier certification program is ISASecure®, which provides globally recognized assurance that a product or process meets the standard's requirements.

Demonstrating this conformity is more than a simple feature checklist. A typical assessment for a component against IEC 62443-4-2 involves a multi-faceted evaluation:

  • Documentation Review: Auditors examine the manufacturer's design documents, security architecture, and user guides. This step verifies that security was designed-in from the start, leveraging the processes and artifacts required by IEC 62443-4-1.
  • Conformity Testing: The component's security functions are actively tested against specific acceptance criteria to ensure they are implemented correctly.
  • Vulnerability Analysis: Finally, auditors perform penetration testing to assess the component's attack resistance. This crucial step ensures the component can withstand an attacker with the skills and resources defined for its target Security Level (SL). Achieving a given SL is therefore not just about implementing the required features, but also proving the product is robust against the corresponding threat level.

The program offers several certifications mapped directly to the standard:

  • SDLA (Secure Development Lifecycle Assurance): Certifies that a supplier's development process conforms to IEC 62443-4-1.
  • CSA (Component Security Assurance): Certifies that an IACS component (e.g., PLC, sensor) meets the technical requirements of IEC 62443-4-2.
  • SSA (System Security Assurance): Certifies that an integrated system (e.g., a full DCS or SCADA system) meets the requirements of IEC 62443-3-3.

Achieving these certifications provides asset owners with confidence that the products they procure are secure by design and fit for purpose in a critical industrial environment.

5.1 Certification for IIoT Components

Recognizing the unique challenges of IIoT devices (e.g., direct internet connectivity, remote physical locations), the ISAGCA and ISCI have defined an enhanced certification profile based on IEC 62443-4-2. This profile adds new functional requirements and defines two tiers of assurance (IIoT Component Certification Study § 4.1):

TierBasis & Key additions
CoreBased on Security Level 2 (SL 2), but adds selected requirements from SL 3 and SL 4 to address the threat of an untrusted network connection. It also includes new requirements for compartmentalization, secure default configuration, and remote updates.
AdvancedBased on Security Level 4 (SL 4). It includes all Core requirements and adds further protections against sophisticated attacks, such as mitigations against reverse-engineering.

This tiered approach allows manufacturers to certify their IIoT components against a security baseline that is explicitly designed for their specific risk posture.

Appendix: Foundational Requirements (FRs)

This section lists the seven Foundational Requirements (FRs) defined in IEC 62443-1-1. These FRs form the basis for all technical security requirements in the standard series.

FR #AcronymFoundational Requirement
FR1IACIdentification and Authentication Control
FR2UCUse Control
FR3SISystem Integrity
FR4DCData Confidentiality
FR5RDFRestricted Data Flow
FR6TRETimely Response to Events
FR7RAResource Availability

Appendix: Component Requirements (CRs)

This section provides a summary of the technical Component Requirements (CRs) for each of the seven Foundational Requirements (FRs) defined in the standard.

RequirementDescription
CR 1.1 (IAC)Identify and authenticate all human users.
CR 1.2 (IAC)Identify and authenticate all software processes and devices.
CR 1.3 (IAC)Provide and manage user accounts.
CR 1.4 (IAC)Provide and manage unique identifiers for each account.
CR 1.5 (IAC)Manage the lifecycle of authenticators (e.g., passwords, keys), including initial values, changes, and secure storage.
CR 1.6 (IAC)Identify and authenticate all users and devices on wireless networks.
CR 1.7 (IAC)Enforce configurable password strength policies.
CR 1.8 (IAC)Support the use of a public key infrastructure (PKI).
CR 1.9 (IAC)Define and enforce the strength of public key-based authentication mechanisms.
CR 1.10 (IAC)Obscure authenticator feedback during the login process (e.g., show asterisks instead of password characters).
CR 1.11 (IAC)Limit the number of consecutive unsuccessful login attempts.
CR 1.12 (IAC)Display a configurable system use notification banner before authentication.
CR 1.13 (IAC)Monitor and control all access attempts from untrusted networks.
CR 1.14 (IAC)Define and enforce the strength of symmetric key-based authentication mechanisms.
CR 2.1 (UC)Enforce access controls and permissions based on assigned roles and privileges.
CR 2.2 (UC)Control and monitor the use of wireless interfaces.
CR 2.3 (UC)Control and monitor the use of portable and mobile devices.
CR 2.4 (UC)Control the execution of mobile code (e.g., scripts, applets).
CR 2.5 (UC)Provide a session lock mechanism that activates after a period of inactivity.
CR 2.6 (UC)Allow users to terminate their own remote sessions.
CR 2.7 (UC)Control the number of concurrent sessions allowed per user.
CR 2.8 (UC)Generate detailed, timestamped audit records for all security-relevant events.
CR 2.9 (UC)Ensure sufficient storage capacity for audit logs and prevent dysfunction if the log becomes full.
CR 2.10 (UC)Handle audit processing failures gracefully without losing essential system functions.
CR 2.11 (UC)Provide the capability to generate accurate timestamps for audit records.
CR 2.12 (UC)Support non-repudiation by ensuring actions can be uniquely traced to a specific user.
CR 2.13 (UC)Control the use of physical diagnostic and test interfaces.
CR 3.1 (SI)Ensure the integrity of all transmitted communications.
CR 3.2 (SI)Provide protection against malicious code.
CR 3.3 (SI)Provide the ability for the component to verify the correct operation of its own security functions (self-tests).
CR 3.4 (SI)Protect the integrity of software and information at rest.
CR 3.5 (SI)Validate all inputs for syntax and content.
CR 3.6 (SI)Ensure that the component's output is deterministic and documented.
CR 3.7 (SI)Handle all error conditions securely without leaking sensitive information.
CR 3.8 (SI)Ensure the integrity of communication sessions.
CR 3.9 (SI)Protect audit logs and audit tools from unauthorized access, modification, or deletion.
CR 3.10 (SI)Provide a secure mechanism to support software and firmware updates.
CR 3.11 (SI)Provide physical tamper resistance and detection capabilities.
CR 3.12 (SI)Support the secure provisioning of product supplier roots of trust.
CR 3.13 (SI)Support the secure provisioning of asset owner roots of trust.
CR 3.14 (SI)Ensure the integrity of the entire boot process (Secure Boot).
CR 4.1 (DC)Protect the confidentiality of information at rest and in transit from unauthorized disclosure.
CR 4.2 (DC)Ensure that data can be securely deleted when no longer needed (information persistence).
CR 4.3 (DC)Use strong, standardized cryptographic algorithms and protocols correctly.
CR 5.1 (RDF)Support the logical segmentation of the network (zones and conduits).
CR 5.2 (RDF)Protect zone boundaries and control the flow of information between them.
CR 5.3 (RDF)Restrict the use of general-purpose, person-to-person communication protocols (e.g., email, instant messaging).
CR 5.4 (RDF)Support application partitioning to control data flow between applications on the same device.
CR 6.1 (TRE)Make audit logs available and accessible for analysis by authorized users and tools.
CR 6.2 (TRE)Provide the capability for continuous monitoring of security events.
CR 7.1 (RA)Provide protection against denial-of-service attacks.
CR 7.2 (RA)Manage system resources (e.g., memory, CPU, network bandwidth) to prevent exhaustion.
CR 7.3 (RA)Provide a mechanism to back up system state and information.
CR 7.4 (RA)Provide a mechanism to recover the system to a known secure state after a failure.
CR 7.6 (RA)Allow for the secure management of all network and security configuration settings.
CR 7.7 (RA)Support the principle of least functionality by allowing unused ports, protocols, and services to be disabled.
CR 7.8 (RA)Provide a mechanism to generate an inventory of the component's hardware and software.

Appendix: Embedded Device Requirements (EDRs)

This section provides a summary of the technical Embedded Device Requirements (EDRs) defined in the standard. These are specific requirements that apply in addition to the base Component Requirements (CRs) for embedded devices.

RequirementDescription
EDR 2.4 (UC)Control the execution of mobile code (e.g., scripts, applets).
EDR 2.13 (UC)Control the use of physical diagnostic and test interfaces.
EDR 3.2 (SI)Provide protection from malicious code.
EDR 3.10 (SI)Provide a secure mechanism to support software and firmware updates.
EDR 3.11 (SI)Provide physical tamper resistance and detection capabilities.
EDR 3.12 (SI)Support the secure provisioning of product supplier roots of trust.
EDR 3.13 (SI)Support the secure provisioning of asset owner roots of trust.
EDR 3.14 (SI)Ensure the integrity of the entire boot process (Secure Boot).
EDR 7.1 (RA)Provide protection against denial-of-service attacks.
EDR 7.7 (RA)Support the principle of least functionality by allowing unused ports, protocols, and services to be disabled.
EDR 7.8 (RA)Provide a mechanism to generate an inventory of the component's hardware and software.

Appendix: Host Device Requirements (HDRs)

This section provides a summary of the technical Host Device Requirements (HDRs) defined in the standard. These are specific requirements that apply in addition to the base Component Requirements (CRs) for host devices, which are typically general-purpose computers running a standard operating system.

RequirementDescription
HDR 2.4 (UC)Control the execution of mobile code (e.g., scripts, applets).
HDR 2.13 (UC)Control the use of physical diagnostic and test interfaces.
HDR 3.10 (SI)Provide a secure mechanism to support software and firmware updates.
HDR 7.1 (RA)Provide protection against denial-of-service attacks.

Appendix: Network Device Requirements (NDRs)

This section provides a summary of the technical Network Device Requirements (NDRs) defined in the standard. These are specific requirements that apply in addition to the base Component Requirements (CRs) for network devices like routers, switches, and firewalls.

RequirementDescription
NDR 1.6 (IAC)Identify and authenticate all users and devices on wireless networks.
NDR 1.13 (IAC)Monitor and control all access attempts from untrusted networks.
NDR 2.4 (UC)Control the execution of mobile code (e.g., scripts, applets).
NDR 2.13 (UC)Control the use of physical diagnostic and test interfaces.
NDR 3.2 (SI)Provide protection against malicious code.
NDR 3.10 (SI)Provide a secure mechanism to support software and firmware updates.
NDR 7.1 (RA)Provide protection against denial-of-service attacks.

Appendix: Software Application Requirements (SARs)

This section provides a summary of the technical Software Application Requirements (SARs) defined in the standard. These are specific requirements that apply in addition to the base Component Requirements (CRs) for software applications.

RequirementDescription
SAR 2.4 (UC)Control the execution of mobile code (e.g., scripts, applets).