IEC 62443-3-3: Industrial Automation and Control Systems Security
International standard for industrial automation and control system (IACS) cybersecurity. Defines system security requirements across 7 foundational requirements: identification and authentication, use control, system integrity, data confidentiality, restricted data flow, timely response to events, and resource availability.
AC Access Control
AU Audit and Accountability
| Control | Name | IEC 62443 References |
|---|---|---|
| AU-02 | Auditable Events | 3-3 SR 2.8 |
| AU-03 | Content Of Audit Records | 3-3 SR 2.8 |
| AU-04 | Audit Storage Capacity | 3-3 SR 2.93-3 SR 7.2 |
| AU-05 | Response To Audit Processing Failures | 3-3 SR 2.9 |
| AU-06 | Audit Monitoring, Analysis, And Reporting | 3-3 SR 6.1 |
| AU-08 | Time Stamps | 3-3 SR 2.11 |
| AU-09 | Protection Of Audit Information | 3-3 SR 6.1 |
| AU-12 | Audit Record Generation | 3-3 SR 2.8 |
CA Security Assessment and Authorization
CM Configuration Management
CP Contingency Planning
IA Identification and Authentication
| Control | Name | IEC 62443 References |
|---|---|---|
| IA-02 | User Identification And Authentication | 3-3 SR 1.1 |
| IA-03 | Device Identification And Authentication | 3-3 SR 1.2 |
| IA-05 | Authenticator Management | 3-3 SR 1.13-3 SR 1.53-3 SR 1.7 |
| IA-08 | Identification and Authentication (Non-Organizational Users) | 3-3 SR 1.1 |
| IA-09 | Service Identification and Authentication | 3-3 SR 1.2 |
IR Incident Response
| Control | Name | IEC 62443 References |
|---|---|---|
| IR-04 | Incident Handling | 3-3 SR 7.4 |
PL Planning
PM Program Management
RA Risk Assessment
SC System and Communications Protection
| Control | Name | IEC 62443 References |
|---|---|---|
| SC-05 | Denial Of Service Protection | 3-3 SR 7.13-3 SR 7.2 |
| SC-06 | Resource Priority | 3-3 SR 7.2 |
| SC-07 | Boundary Protection | 3-3 SR 5.13-3 SR 5.2 |
| SC-08 | Transmission Integrity | 3-3 SR 3.13-3 SR 4.1 |
| SC-18 | Mobile Code | 3-3 SR 2.4 |
| SC-24 | Fail in Known State | 3-3 SR 7.13-3 SR 7.4 |
| SC-28 | Protection of Information at Rest | 3-3 SR 4.1 |
| SC-32 | System Partitioning | 3-3 SR 5.1 |
| SC-45 | System Time Synchronization | 3-3 SR 2.11 |
| SC-46 | Cross Domain Policy Enforcement | 3-3 SR 5.13-3 SR 5.2 |
| SC-48 | Sensor Relocation | 3-3 SR 6.2 |