{"id":244868,"date":"2024-10-19T16:05:47","date_gmt":"2024-10-19T16:05:47","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-62443-4-22019\/"},"modified":"2024-10-25T11:05:23","modified_gmt":"2024-10-25T11:05:23","slug":"bs-en-iec-62443-4-22019","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-62443-4-22019\/","title":{"rendered":"BS EN IEC 62443-4-2:2019"},"content":{"rendered":"

This part of IEC 62443<\/span> <\/span> provides detailed technical control system component requirements (CRs) associated with the seven foundational requirements (FRs) described in IEC TS 62443\u20111\u20111<\/span> <\/span> including defining the requirements for control system capability security levels and their components, SL-C(component).<\/p>\n

As defined in IEC TS 62443\u20111\u20111<\/span> <\/span> there are a total of seven foundational requirements (FRs):<\/p>\n

    \n
  1. \n

    identification and authentication control (IAC),<\/p>\n<\/li>\n

  2. \n

    use control (UC),<\/p>\n<\/li>\n

  3. \n

    system integrity (SI),<\/p>\n<\/li>\n

  4. \n

    data confidentiality (DC),<\/p>\n<\/li>\n

  5. \n

    restricted data flow (RDF),<\/p>\n<\/li>\n

  6. \n

    timely response to events (TRE), and<\/p>\n<\/li>\n

  7. \n

    resource availability (RA).<\/p>\n<\/li>\n<\/ol>\n

    These seven FRs are the foundation for defining control system security capability levels. Defining security capability levels for the control system component is the goal and objective of this document as opposed to SL-T or achieved SLs (SL-A), which are out of scope.<\/p>\n

    \n
    \n NOTE 1\n <\/div>\n

    Refer to IEC 62443\u20112\u20111<\/span> <\/span> [1]<\/span> for an equivalent set of non-technical, program-related, capability requirements necessary for fully achieving a SL-T(control system).<\/p>\n<\/div>\n

    \n
    \n NOTE 2\n <\/div>\n

    The trademarks and trade names mentioned in this document are given for the convenience of users of this document. This information does not constitute an endorsement by IEC of the products named.<\/p>\n<\/div>\n

    PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
    PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
    2<\/td>\nundefined <\/td>\n<\/tr>\n
    5<\/td>\nAnnex ZA(normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n
    7<\/td>\nEnglish
    CONTENTS <\/td>\n<\/tr>\n
    17<\/td>\nFOREWORD <\/td>\n<\/tr>\n
    19<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
    21<\/td>\nFigure 1 \u2013 Parts of the IEC 62443 series <\/td>\n<\/tr>\n
    22<\/td>\n1 Scope
    2 Normative references <\/td>\n<\/tr>\n
    23<\/td>\n3 Terms, definitions, abbreviated terms, acronyms, and conventions
    3.1 Terms and definitions <\/td>\n<\/tr>\n
    29<\/td>\n3.2 Abbreviated terms and acronyms <\/td>\n<\/tr>\n
    31<\/td>\n3.3 Conventions <\/td>\n<\/tr>\n
    32<\/td>\n4 Common component security constraints
    4.1 Overview
    4.2 CCSC 1: Support of essential functions
    4.3 CCSC 2: Compensating countermeasures
    4.4 CCSC 3: Least privilege
    4.5 CCSC 4: Software development process
    5 FR 1 \u2013 Identification and authentication control
    5.1 Purpose and SLC(IAC) descriptions <\/td>\n<\/tr>\n
    33<\/td>\n5.2 Rationale
    5.3 CR 1.1 \u2013 Human user identification and authentication
    5.3.1 Requirement
    5.3.2 Rationale and supplemental guidance
    5.3.3 Requirement enhancements <\/td>\n<\/tr>\n
    34<\/td>\n5.3.4 Security levels
    5.4 CR 1.2 \u2013 Software process and device identification and authentication
    5.4.1 Requirement
    5.4.2 Rationale and supplemental guidance
    5.4.3 Requirement enhancements <\/td>\n<\/tr>\n
    35<\/td>\n5.4.4 Security levels
    5.5 CR 1.3 \u2013 Account management
    5.5.1 Requirement
    5.5.2 Rationale and supplemental guidance
    5.5.3 Requirement enhancements
    5.5.4 Security levels
    5.6 CR 1.4 \u2013 Identifier management
    5.6.1 Requirement
    5.6.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    36<\/td>\n5.6.3 Requirement enhancements
    5.6.4 Security levels
    5.7 CR 1.5 \u2013 Authenticator management
    5.7.1 Requirement
    5.7.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    37<\/td>\n5.7.3 Requirement enhancements
    5.7.4 Security levels
    5.8 CR 1.6 \u2013 Wireless access management
    5.9 CR 1.7 \u2013 Strength of password-based authentication
    5.9.1 Requirement
    5.9.2 Rationale and supplemental guidance
    5.9.3 Requirement enhancements <\/td>\n<\/tr>\n
    38<\/td>\n5.9.4 Security levels
    5.10 CR 1.8 \u2013 Public key infrastructure certificates
    5.10.1 Requirement
    5.10.2 Rationale and supplemental guidance
    5.10.3 Requirement enhancements
    5.10.4 Security levels <\/td>\n<\/tr>\n
    39<\/td>\n5.11 CR 1.9 \u2013 Strength of public key-based authentication
    5.11.1 Requirement
    5.11.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    40<\/td>\n5.11.3 Requirement enhancements
    5.11.4 Security levels
    5.12 CR 1.10 \u2013 Authenticator feedback
    5.12.1 Requirement
    5.12.2 Rationale and supplemental guidance
    5.12.3 Requirement enhancements
    5.12.4 Security levels
    5.13 CR 1.11 \u2013 Unsuccessful login attempts
    5.13.1 Requirement <\/td>\n<\/tr>\n
    41<\/td>\n5.13.2 Rationale and supplemental guidance
    5.13.3 Requirement enhancements
    5.13.4 Security levels
    5.14 CR 1.12 \u2013 System use notification
    5.14.1 Requirement
    5.14.2 Rationale and supplemental guidance
    5.14.3 Requirement enhancements <\/td>\n<\/tr>\n
    42<\/td>\n5.14.4 Security levels
    5.15 CR 1.13 \u2013 Access via untrusted networks
    5.16 CR 1.14 \u2013 Strength of symmetric key-based authentication
    5.16.1 Requirement
    5.16.2 Rationale and supplemental guidance
    5.16.3 Requirement enhancements <\/td>\n<\/tr>\n
    43<\/td>\n5.16.4 Security levels
    6 FR 2 \u2013 Use control
    6.1 Purpose and SLC(UC) descriptions
    6.2 Rationale
    6.3 CR 2.1 \u2013 Authorization enforcement
    6.3.1 Requirement
    6.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    44<\/td>\n6.3.3 Requirement enhancements
    6.3.4 Security levels <\/td>\n<\/tr>\n
    45<\/td>\n6.4 CR 2.2 \u2013 Wireless use control
    6.4.1 Requirement
    6.4.2 Rationale and supplemental guidance
    6.4.3 Requirement enhancements
    6.4.4 Security levels
    6.5 CR 2.3 \u2013 Use control for portable and mobile devices
    6.6 CR 2.4 \u2013 Mobile code
    6.7 CR 2.5 \u2013 Session lock
    6.7.1 Requirement <\/td>\n<\/tr>\n
    46<\/td>\n6.7.2 Rationale and supplemental guidance
    6.7.3 Requirement enhancements
    6.7.4 Security levels
    6.8 CR 2.6 \u2013 Remote session termination
    6.8.1 Requirement
    6.8.2 Rationale and supplemental guidance
    6.8.3 Requirement enhancements
    6.8.4 Security levels
    6.9 CR 2.7 \u2013 Concurrent session control
    6.9.1 Requirement <\/td>\n<\/tr>\n
    47<\/td>\n6.9.2 Rationale and supplemental guidance
    6.9.3 Requirement enhancements
    6.9.4 Security levels
    6.10 CR 2.8 \u2013 Auditable events
    6.10.1 Requirement
    6.10.2 Rationale and supplemental guidance
    6.10.3 Requirement enhancements <\/td>\n<\/tr>\n
    48<\/td>\n6.10.4 Security levels
    6.11 CR 2.9 \u2013 Audit storage capacity
    6.11.1 Requirement
    6.11.2 Rationale and supplemental guidance
    6.11.3 Requirement enhancements
    6.11.4 Security levels
    6.12 CR 2.10 \u2013 Response to audit processing failures
    6.12.1 Requirement <\/td>\n<\/tr>\n
    49<\/td>\n6.12.2 Rationale and supplemental guidance
    6.12.3 Requirement enhancements
    6.12.4 Security levels
    6.13 CR 2.11 \u2013 Timestamps
    6.13.1 Requirement
    6.13.2 Rationale and supplemental guidance
    6.13.3 Requirement enhancements
    6.13.4 Security levels <\/td>\n<\/tr>\n
    50<\/td>\n6.14 CR 2.12 \u2013 Non-repudiation
    6.14.1 Requirement
    6.14.2 Rationale and supplemental guidance
    6.14.3 Requirement enhancements
    6.14.4 Security levels
    6.15 CR 2.13 \u2013 Use of physical diagnostic and test interfaces
    7 FR 3 \u2013 System integrity
    7.1 Purpose and SLC(SI) descriptions <\/td>\n<\/tr>\n
    51<\/td>\n7.2 Rationale
    7.3 CR 3.1 \u2013 Communication integrity
    7.3.1 Requirement
    7.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    52<\/td>\n7.3.3 Requirement enhancements
    7.3.4 Security levels
    7.4 CR 3.2 \u2013 Protection from malicious code
    7.5 CR 3.3 \u2013 Security functionality verification
    7.5.1 Requirement
    7.5.2 Rationale and supplemental guidance
    7.5.3 Requirement enhancements <\/td>\n<\/tr>\n
    53<\/td>\n7.5.4 Security levels
    7.6 CR 3.4 \u2013 Software and information integrity
    7.6.1 Requirement
    7.6.2 Rationale and supplemental guidance
    7.6.3 Requirement enhancements
    7.6.4 Security levels
    7.7 CR 3.5 \u2013 Input validation
    7.7.1 Requirement <\/td>\n<\/tr>\n
    54<\/td>\n7.7.2 Rationale and supplemental guidance
    7.7.3 Requirement enhancements
    7.7.4 Security levels
    7.8 CR 3.6 \u2013 Deterministic output
    7.8.1 Requirement
    7.8.2 Rationale and supplemental guidance
    7.8.3 Requirement enhancements <\/td>\n<\/tr>\n
    55<\/td>\n7.8.4 Security levels
    7.9 CR 3.7 \u2013 Error handling
    7.9.1 Requirement
    7.9.2 Rationale and supplemental guidance
    7.9.3 Requirement enhancements
    7.9.4 Security levels
    7.10 CR 3.8 \u2013 Session integrity
    7.10.1 Requirement <\/td>\n<\/tr>\n
    56<\/td>\n7.10.2 Rationale and supplemental guidance
    7.10.3 Requirement enhancements
    7.10.4 Security levels
    7.11 CR 3.9 \u2013 Protection of audit information
    7.11.1 Requirement
    7.11.2 Rationale and supplemental guidance
    7.11.3 Requirement enhancements
    7.11.4 Security levels <\/td>\n<\/tr>\n
    57<\/td>\n7.12 CR 3.10 \u2013 Support for updates
    7.13 CR 3.11 \u2013 Physical tamper resistance and detection
    7.14 CR 3.12 \u2013 Provisioning product supplier roots of trust
    7.15 CR 3.13 \u2013 Provisioning asset owner roots of trust
    7.16 CR 3.14 \u2013 Integrity of the boot process
    8 FR 4 \u2013 Data confidentiality
    8.1 Purpose and SLC(DC) descriptions
    8.2 Rationale
    8.3 CR 4.1 \u2013 Information confidentiality
    8.3.1 Requirement <\/td>\n<\/tr>\n
    58<\/td>\n8.3.2 Rationale and supplemental guidance
    8.3.3 Requirement enhancements
    8.3.4 Security levels
    8.4 CR 4.2 \u2013 Information persistence
    8.4.1 Requirement
    8.4.2 Rationale and supplemental guidance
    8.4.3 Requirement enhancements <\/td>\n<\/tr>\n
    59<\/td>\n8.4.4 Security levels
    8.5 CR 4.3 \u2013 Use of cryptography
    8.5.1 Requirement
    8.5.2 Rationale and supplemental guidance
    8.5.3 Requirement enhancements
    8.5.4 Security levels <\/td>\n<\/tr>\n
    60<\/td>\n9 FR 5 \u2013 Restricted data flow
    9.1 Purpose and SLC(RDF) descriptions
    9.2 Rationale
    9.3 CR 5.1 \u2013 Network segmentation
    9.3.1 Requirement
    9.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    61<\/td>\n9.3.3 Requirement enhancements
    9.3.4 Security levels
    9.4 CR 5.2 \u2013 Zone boundary protection
    9.5 CR 5.3 \u2013 General-purpose person-to-person communication restrictions
    9.6 CR 5.4 \u2013 Application partitioning
    10 FR 6 \u2013 Timely response to events
    10.1 Purpose and SLC(TRE) descriptions <\/td>\n<\/tr>\n
    62<\/td>\n10.2 Rationale
    10.3 CR 6.1 \u2013 Audit log accessibility
    10.3.1 Requirement
    10.3.2 Rationale and supplemental guidance
    10.3.3 Requirement enhancements
    10.3.4 Security levels
    10.4 CR 6.2 \u2013 Continuous monitoring
    10.4.1 Requirement
    10.4.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    63<\/td>\n10.4.3 Requirement enhancements
    10.4.4 Security levels
    11 FR 7 \u2013 Resource availability
    11.1 Purpose and SLC(RA) descriptions
    11.2 Rationale <\/td>\n<\/tr>\n
    64<\/td>\n11.3 CR 7.1 \u2013 Denial of service protection
    11.3.1 Requirement
    11.3.2 Rationale and supplemental guidance
    11.3.3 Requirement enhancements
    11.3.4 Security levels
    11.4 CR 7.2 \u2013 Resource management
    11.4.1 Requirement
    11.4.2 Rationale and supplemental guidance
    11.4.3 Requirement enhancements
    11.4.4 Security levels <\/td>\n<\/tr>\n
    65<\/td>\n11.5 CR 7.3 \u2013 Control system backup
    11.5.1 Requirement
    11.5.2 Rationale and supplemental guidance
    11.5.3 Requirement enhancements
    11.5.4 Security levels
    11.6 CR 7.4 \u2013 Control system recovery and reconstitution
    11.6.1 Requirement
    11.6.2 Rationale and supplemental guidance
    11.6.3 Requirement enhancements <\/td>\n<\/tr>\n
    66<\/td>\n11.6.4 Security levels
    11.7 CR 7.5 \u2013 Emergency power
    11.8 CR 7.6 \u2013 Network and security configuration settings
    11.8.1 Requirement
    11.8.2 Rationale and supplemental guidance
    11.8.3 Requirement enhancements
    11.8.4 Security levels
    11.9 CR 7.7 \u2013 Least functionality
    11.9.1 Requirement
    11.9.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    67<\/td>\n11.9.3 Requirement enhancements
    11.9.4 Security levels
    11.10 CR 7.8 \u2013 Control system component inventory
    11.10.1 Requirement
    11.10.2 Rationale and supplemental guidance
    11.10.3 Requirement enhancements
    11.10.4 Security levels
    12 Software application requirements
    12.1 Purpose
    12.2 SAR 2.4 \u2013 Mobile code
    12.2.1 Requirement <\/td>\n<\/tr>\n
    68<\/td>\n12.2.2 Rationale and supplemental guidance
    12.2.3 Requirement enhancements
    12.2.4 Security levels
    12.3 SAR 3.2 \u2013 Protection from malicious code
    12.3.1 Requirement
    12.3.2 Rationale and supplemental guidance
    12.3.3 Requirement enhancements
    12.3.4 Security levels <\/td>\n<\/tr>\n
    69<\/td>\n13 Embedded device requirements
    13.1 Purpose
    13.2 EDR 2.4 \u2013 Mobile code
    13.2.1 Requirement
    13.2.2 Rationale and supplemental guidance
    13.2.3 Requirement enhancements
    13.2.4 Security levels
    13.3 EDR 2.13 \u2013 Use of physical diagnostic and test interfaces
    13.3.1 Requirement <\/td>\n<\/tr>\n
    70<\/td>\n13.3.2 Rationale and supplemental guidance
    13.3.3 Requirement enhancements
    13.3.4 Security levels
    13.4 EDR 3.2 \u2013 Protection from malicious code
    13.4.1 Requirement
    13.4.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    71<\/td>\n13.4.3 Requirement enhancements
    13.4.4 Security levels
    13.5 EDR 3.10 \u2013 Support for updates
    13.5.1 Requirement
    13.5.2 Rationale and supplemental guidance
    13.5.3 Requirement enhancements
    13.5.4 Security levels
    13.6 EDR 3.11 \u2013 Physical tamper resistance and detection
    13.6.1 Requirement
    13.6.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    72<\/td>\n13.6.3 Requirement enhancements
    13.6.4 Security levels
    13.7 EDR 3.12 \u2013 Provisioning product supplier roots of trust
    13.7.1 Requirement
    13.7.2 Rationale and supplemental guidance
    13.7.3 Requirement enhancements <\/td>\n<\/tr>\n
    73<\/td>\n13.7.4 Security levels
    13.8 EDR 3.13 \u2013 Provisioning asset owner roots of trust
    13.8.1 Requirement
    13.8.2 Rationale and supplemental guidance
    13.8.3 Requirement enhancements
    13.8.4 Security levels <\/td>\n<\/tr>\n
    74<\/td>\n13.9 EDR 3.14 \u2013 Integrity of the boot process
    13.9.1 Requirement
    13.9.2 Rationale and supplemental guidance
    13.9.3 Requirement enhancements
    13.9.4 Security levels
    14 Host device requirements
    14.1 Purpose
    14.2 HDR 2.4 \u2013 Mobile code
    14.2.1 Requirement <\/td>\n<\/tr>\n
    75<\/td>\n14.2.2 Rationale and supplemental guidance
    14.2.3 Requirement enhancements
    14.2.4 Security levels
    14.3 HDR 2.13 \u2013 Use of physical diagnostic and test interfaces
    14.3.1 Requirement
    14.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    76<\/td>\n14.3.3 Requirement enhancements
    14.3.4 Security levels
    14.4 HDR 3.2 \u2013 Protection from malicious code
    14.4.1 Requirement
    14.4.2 Rationale and supplemental guidance
    14.4.3 Requirement enhancements
    14.4.4 Security levels
    14.5 HDR 3.10 \u2013 Support for updates
    14.5.1 Requirement
    14.5.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    77<\/td>\n14.5.3 Requirement enhancements
    14.5.4 Security levels
    14.6 HDR 3.11 \u2013 Physical tamper resistance and detection
    14.6.1 Requirement
    14.6.2 Rationale and supplemental guidance
    14.6.3 Requirement enhancements
    14.6.4 Security levels <\/td>\n<\/tr>\n
    78<\/td>\n14.7 HDR 3.12 \u2013 Provisioning product supplier roots of trust
    14.7.1 Requirement
    14.7.2 Rationale and supplemental guidance
    14.7.3 Requirement enhancements
    14.7.4 Security levels
    14.8 HDR 3.13 \u2013 Provisioning asset owner roots of trust
    14.8.1 Requirement
    14.8.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    79<\/td>\n14.8.3 Requirement enhancements
    14.8.4 Security levels
    14.9 HDR 3.14 \u2013 Integrity of the boot process
    14.9.1 Requirement
    14.9.2 Rationale and supplemental guidance
    14.9.3 Requirement enhancements <\/td>\n<\/tr>\n
    80<\/td>\n14.9.4 Security levels
    15 Network device requirements
    15.1 Purpose
    15.2 NDR 1.6 \u2013 Wireless access management
    15.2.1 Requirement
    15.2.2 Rationale and supplemental guidance
    15.2.3 Requirement enhancements
    15.2.4 Security levels
    15.3 NDR 1.13 \u2013 Access via untrusted networks
    15.3.1 Requirement <\/td>\n<\/tr>\n
    81<\/td>\n15.3.2 Rationale and supplemental guidance
    15.3.3 Requirement enhancements
    15.3.4 Security levels
    15.4 NDR 2.4 \u2013 Mobile code
    15.4.1 Requirement
    15.4.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    82<\/td>\n15.4.3 Requirement enhancements
    15.4.4 Security levels
    15.5 NDR 2.13 \u2013 Use of physical diagnostic and test interfaces
    15.5.1 Requirement
    15.5.2 Rationale and supplemental guidance
    15.5.3 Requirement enhancements <\/td>\n<\/tr>\n
    83<\/td>\n15.5.4 Security levels
    15.6 NDR 3.2 \u2013 Protection from malicious code
    15.6.1 Requirement
    15.6.2 Rationale and supplemental guidance
    15.6.3 Requirement enhancements
    15.6.4 Security levels
    15.7 NDR 3.10 \u2013 Support for updates
    15.7.1 Requirement
    15.7.2 Rationale and supplemental guidance
    15.7.3 Requirement enhancements <\/td>\n<\/tr>\n
    84<\/td>\n15.7.4 Security levels
    15.8 NDR 3.11 \u2013 Physical tamper resistance and detection
    15.8.1 Requirement
    15.8.2 Rationale and supplemental guidance
    15.8.3 Requirement enhancements
    15.8.4 Security levels
    15.9 NDR 3.12 \u2013 Provisioning product supplier roots of trust
    15.9.1 Requirement <\/td>\n<\/tr>\n
    85<\/td>\n15.9.2 Rationale and supplemental guidance
    15.9.3 Requirement enhancements
    15.9.4 Security levels
    15.10 NDR 3.13 \u2013 Provisioning asset owner roots of trust
    15.10.1 Requirement
    15.10.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n
    86<\/td>\n15.10.3 Requirement enhancements
    15.10.4 Security levels
    15.11 NDR 3.14 \u2013 Integrity of the boot process
    15.11.1 Requirement
    15.11.2 Rationale and supplemental guidance
    15.11.3 Requirement enhancements <\/td>\n<\/tr>\n
    87<\/td>\n15.11.4 Security levels
    15.12 NDR 5.2 \u2013 Zone boundary protection
    15.12.1 Requirement
    15.12.2 Rationale and supplemental guidance
    15.12.3 Requirement enhancements
    15.12.4 Security levels <\/td>\n<\/tr>\n
    88<\/td>\n15.13 NDR 5.3 \u2013 General purpose, person-to-person communication restrictions
    15.13.1 Requirement
    15.13.2 Rationale and supplemental guidance
    15.13.3 Requirement enhancements
    15.13.4 Security levels <\/td>\n<\/tr>\n
    89<\/td>\nAnnex A (informative)Device categories
    A.1 General
    A.2 Device category: embedded device
    A.2.1 Programmable logic controller (PLC)
    A.2.2 Intelligent electronic device (IED) <\/td>\n<\/tr>\n
    90<\/td>\nA.3 Device category: network device
    A.3.1 Switch
    A.3.2 Virtual private network (VPN) terminator
    A.4 Device category: host device\/application
    A.4.1 Operator workstation <\/td>\n<\/tr>\n
    91<\/td>\nA.4.2 Data historian <\/td>\n<\/tr>\n
    92<\/td>\nAnnex B (informative)Mapping of CRs and REs to FR SLs 1-4
    B.1 Overview
    B.2 SL mapping table <\/td>\n<\/tr>\n
    93<\/td>\nTable B.1 \u2013 Mapping of CRs and REs to FR SL levels 1-4 <\/td>\n<\/tr>\n
    98<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

    Security for industrial automation and control systems – Technical security requirements for IACS components<\/b><\/p>\n\n\n\n\n
    Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
    BSI<\/b><\/a><\/td>\n2019<\/td>\n100<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":244875,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[385,2641],"product_tag":[],"class_list":{"0":"post-244868","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-25-040-40","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/244868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/244875"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=244868"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=244868"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=244868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}