IEC 62443-1-1 Terminology, concepts and models
Foundation. Defines IACS, zone, conduit, security level (SL), and the 7 Foundational Requirements (FR1-FR7).
IEC 62443 is the international reference for cybersecurity of industrial automation and control systems (IACS). Multi-part framework covering policies, system requirements, component requirements, and certification. The OT-side counterpart of ISO/IEC 27001.
IEC 62443-1-1 Foundation. Defines IACS, zone, conduit, security level (SL), and the 7 Foundational Requirements (FR1-FR7).
IEC 62443-2-1 Operator-side : how to build a Cyber Security Management System (CSMS) for an industrial facility. Companion to ISO 27001 for OT environments.
IEC 62443-2-4 Requirements for system integrators and service providers (SI, OEM contractors).
IEC 62443-3-2 The 'how to do a cyber risk assessment for an OT site' standard. Zones and conduits methodology, target Security Levels (SL-T).
IEC 62443-3-3 Defines 7 Foundational Requirements (Identification, Use Control, System Integrity, Data Confidentiality, Restricted Data Flow, Timely Response, Resource Availability) and how SL 1-4 map to them.
IEC 62443-4-1 For vendors. SDL practices : threat modeling, secure coding, security testing, vulnerability handling. Required for ISA Secure / IECEE CB certifications.
IEC 62443-4-2 Specifies which component-level security capabilities (CR/CCSC) a PLC/RTU/HMI/Network device must implement to achieve SL 1, 2, 3, or 4 certification.
(IACS) (SL) (FR1-FR7) (CSMS) (SL-T / SL-A) (SL-C) Before 2010, industrial cybersecurity was mostly improvised — copy-paste of IT controls onto OT networks, or pure isolation hopes (“air gap”). Then came Stuxnet (2010), BlackEnergy/Industroyer (2015-2016), TRITON (2017), Colonial Pipeline (2021), and a sharp realization : OT environments need their own cybersecurity framework. IT standards (ISO 27001, NIST CSF) were not enough because OT has different priorities :
ISA started the SP99 work in 2002, which became IEC 62443 in 2009. Today it’s the only complete OT-focused cybersecurity framework with both system-level (operator) and component-level (vendor) requirements, and an active certification ecosystem (ISASecure, TÜV).
The EU NIS2 Directive (Directive 2022/2555) entered into force in 2023 with national transposition due by October 2024. It massively expands the scope of essential and important entities required to implement risk-based cybersecurity. For industrial operators in essential sectors (energy, water, transport, healthcare, digital infrastructure, manufacturing of critical products), NIS2 effectively makes IEC 62443 the de facto reference framework because :
Similar momentum in the US with CIRCIA (Cyber Incident Reporting for Critical Infrastructure Act) and TSA pipeline security directives.
A safety-critical system (SIS) is a juicy target for an attacker — disabling it during a real demand creates catastrophic potential. TRITON / TRISIS (2017) explicitly targeted a Triconex safety controller in Saudi Arabia. This is why IEC 61511 Edition 2 (2016) explicitly references IEC 62443 for cybersecurity of SIS, and the upcoming Edition 3 will tighten this further.
In practice, every IEC 61511 lifecycle phase now has a cybersecurity counterpart:
| IEC 61511 Phase | Cybersecurity overlap |
|---|---|
| Hazard & Risk Analysis | Add cyber threats to HAZOP scenarios (e.g., “what if SIS logic compromised remotely?”) |
| Safety Requirements Spec | Add cybersecurity SL-T per IEC 62443-3-2 |
| SIS Design | Component selection with SL-C per IEC 62443-4-2 |
| Operations | Patching, vulnerability monitoring, MOC includes cyber assessment |
| Audit (FSA) | Cybersecurity assessment alongside functional safety audit |
IEC 62443’s zoning methodology, applied on top of the Purdue Enterprise Reference Architecture :
Level 4/5 : Enterprise — ERP, mail, HR ← IT, ISO 27001
│
╔═════ DMZ ════════╗
║ Historian replica ║ ← Conduit with strict filtering
║ AV / Patch server ║
╚════════════════════╝
│
Level 3 : Operations / Manufacturing — MES, Historian
│ ← Conduit, deep packet inspection
Level 2 : Supervisory — HMI, SCADA, engineering WS
│ ← Conduit, source/dest filtering
Level 1 : Basic Control — DCS controllers, PLCs, RTU
│ ← Conduit, allowlist protocols only
Level 0 : Process — sensors, actuators, IO
│
╔═════ Safety zone ════════╗
║ Safety PLC (Triconex) ║ ← Strict isolation, possibly air-gapped
║ IEC 61511 SIS ║
╚══════════════════════════╝
Each level becomes a zone. Connections between zones become conduits subject to access controls, monitoring, and possibly physical separation (data diodes).
For OT cybersecurity teams, ISA / IEC 62443 certification (training + exam, via ISA or TÜV Rheinland) is becoming a hiring baseline in 2025-2026, similar to TÜV FS Engineer for functional safety roles.