Shopping Cart

No products in the cart.

BSI PD IEC TR 63283-3:2022

$198.66

Industrial-process measurement, control and automation. Smart manufacturing – Challenges for Cybersecurity

Published By Publication Date Number of Pages
BSI 2022 58
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
2 undefined
4 CONTENTS
7 FOREWORD
9 INTRODUCTION
10 1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms and acronyms
3.1 Terms and definitions
17 3.2 Abbreviated terms and acronyms
4 Smart Manufacturing challenges for cybersecurity
18 5 Systems engineering
19 Tables
Table 1 – ISO/IEC/IEEE 15288 System engineering process
26 6 Applying IEC 62443 (all parts) to smart manufacturing
6.1 General
Figures
Figure 1 – The IEC 62443 series
27 6.2 Relation to ISO/IEC 27000 (all parts)
Figure 2 – Details of the application of individual parts of IEC 62443by different roles during the individual life cycles of automation assets
28 6.3 Reference model
6.4 Foundational requirements
29 6.5 Zones and conduits in system of systems
6.6 Security risk assessment and security levels
6.7 Security lifecycle
30 6.8 Auditing and logging
6.9 Conclusion
7 Smart Manufacturing security threats
7.1 General
31 7.2 Use case view on cybersecurity
7.2.1 General
7.2.2 Use case “Manufacturing of individualized products”
Figure 3 – Use case “Manufacturing of individualized products”
32 Table 2 – Use case “Manufacturing of individualized products”
33 7.2.3 Use case “Standardization of production technologies”
Figure 4 – Use case “Standardization of production technologies”
34 7.2.4 Use case “Flexible scheduling and resource allocation”
Figure 5 – Use case “Flexible scheduling and resource allocation”
Table 3 – Use case “Standardization of production technologies”
35 7.2.5 Use case “Modularization of production system”
Figure 6 – Use case “Modularization of production system”
Table 4 – Use case “Flexible Scheduling and resource allocation”
36 Table 5 – Use case “Modularization of production system”
37 7.2.6 Use case “Feedback loops”
38 7.2.7 Use case “Simulation in operation”
Figure 7 – Use case “Feedback loops”
Table 6 – Use Case “Feedback loops”
39 Figure 8 – Use case “Simulation in operation”
Table 7 – Use case “Simulation in operation”
40 7.2.8 Use case “Simulation in design and engineering”
7.2.9 Use cases “Update and functional scalability of production resources” and “Device configuration”
Figure 9 – Use case “Simulation in design and engineering”
Table 8 – Use case “Simulation in design and engineering”
41 7.2.10 Use case “Information extraction from production systems”
Table 9 – Use case “Update and functional scalability of production resources”,Use case “Device configuration”
42 Figure 10 – Use case “Information extraction from production systems”
Table 10 – Use case “Information extraction from production systems”
43 7.2.11 Use case “Self-optimization of production resources”Use case “Optimization of operation through machine learning”Use case “Optimization in design and engineering through machine learning”
7.2.12 Use case “Design for energy efficiency”Use case “Optimization of energy”
Table 11 – Use case “Machine learning”
44 7.2.13 Use case “Seamless models”
Table 12 – Use case “Design for energy efficiency”, Use case “Optimization of energy”
45 7.3 Smart Manufacturing lifecycle view on cybersecurity
Figure 11 – From Value Streams to Value Networks
Table 13 – Use case “Seamless models”
46 8 Summary of challenges
8.1 General
Table 14 – Smart Manufacturing Lifecycle View on Cybersecurity
47 8.2 Identification and Authentication Control (AC)
8.3 Use Control (UC)
Table 15 – Identification and Authentication Control (AC) challenges
48 Figure 12 – Lifecycles, users/stakeholders, granted privileges, and views
Table 16 – Use Control (UC) challenges
49 8.4 Data and System Integrity (DI)
Table 17 – Data and System Integrity (DI) challenges
50 8.5 Data Confidentiality (DC)
8.5.1 General
8.5.2 Intended Use
Figure 13 – Privacy and Intended Use
Table 18 – Data Confidentiality (DC) challenges regarding privacy
51 8.5.3 Data Confidentiality
8.6 Restricted Data Flow (RDF)
8.7 Timely Response to Events (TRE)
Table 19 – Data Confidentiality (DC) requirements other than privacy
Table 20 – Restricted Data Flow (RDF) challenges
52 8.8 Resource Availability (RA)
Table 21 – Timely Response to Events (TRE) challenges
Table 22 – Resource Availability (RA) challenges
53 Annex A (informative)Mapping use cases to foundational requirements
Table A.1 – Mapping use cases to foundational requirements
54 Annex B (informative)Secure identities
55 Bibliography
BSI PD IEC TR 63283-3:2022
$198.66