Garma Electrónica, Cibersecurity and data protection, standard IEC 62443-4-2

Published on 2023-11-02

GARMA LOGO   iec 62443-4-2 the most recognized standard in the insutry

The IEC is a global, not-for-profit membership organization that brings together more than 170 countries and coordinates the work of 20 000 experts globally. The International Electrotechnical Commission is the world’s leading organization for the preparation and publication of international standards for all electrical, electronic and related technologies.


IEC 62443 is a comprehensive series of international standards designed specifically for the safety of industrial automation and control systems. This standard covers from the company's Management System to the component; including product development, design and integration.


Part 62443-4-2 indicates the technical requirements of the components of an Industrial Automated Control System (IACS) with the seven fundamental requirements. These seven fundamental requirements are defined in the technical specification IEC 62443-1-1:

• Identification and Autentication Control (IAC)
• Use Control (UC)
• System Integrity (SI)
• Data Confidentiality (DC)
• Restricted Data Flow (RDF)
• Timely Response to Events (TRE)

• Resource Availability (RA)


normativa IEC62433 Garma Electronica


Is IEC 62443 mandatory?

 

No, it is not mandatory, although it is becoming the accepted standard for cybersecurity of industrial automation and control systems.


What is "defense in depth"?


 

IEC 62443 promotes the principle of "defense in depth", which emphasizes multiple layers of security measures to protect industrial control systems.

 

This multi-layered approach involves the application of various security controls:

 

 

-Network segmentation

 

-Firewalls

 

-Access control systems

 

-Intrusion control

 

-Secure coding systems.

 


We want to help companies face evolving threats with our solutions for industrial automation, created under the IEC 62443-4-2 roadmap and protect critical infrastructure from cyberattacks.


Do not hesitate to contact us for more information here

 

COMMENTS

Add a comment