IEC 62443-4-2-2019 PDF

St IEC 62443-4-2-2019

Name in English:
St IEC 62443-4-2-2019

Name in Russian:
Ст IEC 62443-4-2-2019

Description in English:

Original standard IEC 62443-4-2-2019 in PDF full version. Additional info + preview on request

Description in Russian:
Оригинальный стандарт IEC 62443-4-2-2019 в PDF полная версия. Дополнительная инфо + превью по запросу
Document status:
Active

Format:
Electronic (PDF)

Delivery time (for English version):
1 business day

Delivery time (for Russian version):
365 business days

SKU:
stiec07019

Choose Document Language:
€35

Full title and description

IEC 62443-4-2:2019 — Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components. This document specifies detailed technical component requirements (Component Requirements, CRs) aligned to the seven Foundational Requirements (FRs) used across the IEC 62443 series and defines security capability levels for components (SL‑C) to support selection, procurement and integration of components into IACS solutions.

Abstract

IEC 62443-4-2:2019 provides normative technical requirements for individual IACS components (software applications, embedded devices, host devices and network devices). It maps component-level controls to the seven Foundational Requirements (identification and authentication control; use control; system integrity; data confidentiality; restricted data flow; timely response to events; resource availability) and defines component security capability levels (SL‑C). A corrigendum published in 2022 corrected noted issues and has been incorporated into the current text.

General information

  • Status: Published.
  • Publication date: 27 February 2019 (Edition 1.0).
  • Publisher: International Electrotechnical Commission (IEC).
  • ICS / categories: 25.040.40 (Industrial process measurement and control); 35.030 (IT security).
  • Edition / version: Edition 1.0 (with Corrigendum 1 published 30 August 2022 available).
  • Number of pages: 192 (IEC webstore edition).

Scope

The standard defines technical security requirements for IACS components to enable their secure integration into systems. It addresses component-level controls (Component Requirements) mapped to the seven Foundational Requirements and defines component security capability levels (SL‑C). It covers four component categories — software applications, embedded devices, host devices and network devices — and specifies constraints and documentation requirements for components whose technical limitations must be mitigated at system level. The standard focuses on component capabilities (SL‑C); system target levels (SL‑T) and achieved SLs (SL‑A) are handled elsewhere in the series.

Key topics and requirements

  • Component Requirements (CRs) mapped to the seven Foundational Requirements: identification & authentication, use control, system integrity, data confidentiality, restricted data flow, timely response to events, resource availability.
  • Definition of component security capability levels (SL‑C) to express required robustness of a component for a given security level.
  • Component categories and tailoring: software applications, embedded devices, host devices, network devices — with CRs adapted to each category.
  • Common Component Security Constraints (CCSC) and guidance on compensating measures when components cannot meet certain technical requirements; documentation obligations for such compensating measures.
  • Requirements that a component be developed and supported within a secure product development lifecycle (linking to Part 4‑1 requirements) as part of assurance expectations.

Typical use and users

Primary users include product suppliers (vendors) designing and testing IACS components, system integrators and OEMs evaluating component capabilities for system design, and asset owners/procurers using SL‑C outputs to inform acquisition decisions. It is used to specify technical controls in procurement, to evaluate vendor products against required SL‑C, and as a reference for secure component design and documentation.

Related standards

IEC 62443-4-2 is part of the IEC 62443 series. Closely related parts include IEC 62443-4-1 (secure product development lifecycle requirements), IEC 62443-3-3 (system security requirements and security levels), IEC 62443-2-1/2-4 (asset owner and service provider program requirements), and the foundational documents IEC 62443-1-1 and related technical reports. Compliance with 4‑2 is typically considered together with 4‑1 for development assurance and with 3‑3 for system-level mapping.

Keywords

IACS components, Component Requirements (CR), SL‑C (security level — component), foundational requirements, identification and authentication, access/use control, system integrity, data confidentiality, restricted data flow, timely response to events, resource availability, CCSC, secure product development lifecycle.

FAQ

Q: What is this standard?

A: IEC 62443-4-2:2019 is the part of the IEC 62443 series that specifies technical security requirements for individual industrial automation and control system (IACS) components (software, embedded devices, hosts and network devices), and defines component security capability levels (SL‑C).

Q: What does it cover?

A: It covers component-level technical controls (Component Requirements) mapped to the seven Foundational Requirements (identification & authentication, use control, system integrity, data confidentiality, restricted data flow, timely response to events, resource availability), component categories and constraints (CCSC), and the documentation/compensation expectations for components that cannot meet certain technical controls.

Q: Who typically uses it?

A: Product vendors and developers, system integrators, OEMs, procurement teams and asset owners use it to design, evaluate and select components for secure IACS deployments; certification and assessment bodies may use it for product-level evaluations.

Q: Is it current or superseded?

A: The document was published in February 2019 (Edition 1.0) and a Corrigendum (COR1) was issued in August 2022 to correct specific items; the standard remains the current Part 4‑2 text while the IEC 62443 series continues to evolve. Check national/regional adoptions for local publication dates.

Q: Is it part of a series?

A: Yes — IEC 62443-4-2 is one part of the broader IEC 62443 series addressing IACS cybersecurity; other parts address terminology and models (1‑1), policies and procedures (2‑x), system requirements (3‑x), secure development (4‑1), profiles and evaluation methods. The parts are intended to be used together to define system and component security and assurance.

Q: What are the key keywords?

A: Component Requirements (CR), SL‑C, IACS components, foundational requirements (IAC, UC, SI, DC, RDF, TRE, RA), CCSC, secure development lifecycle, procurement, product assurance.