BSI PD IEC TR 63283-3:2022
$198.66
Industrial-process measurement, control and automation. Smart manufacturing – Challenges for Cybersecurity
Published By | Publication Date | Number of Pages |
BSI | 2022 | 58 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
4 | CONTENTS |
7 | FOREWORD |
9 | INTRODUCTION |
10 | 1 Scope 2 Normative references 3 Terms, definitions, abbreviated terms and acronyms 3.1 Terms and definitions |
17 | 3.2 Abbreviated terms and acronyms 4 Smart Manufacturing challenges for cybersecurity |
18 | 5 Systems engineering |
19 | Tables Table 1 – ISO/IEC/IEEE 15288 System engineering process |
26 | 6 Applying IEC 62443 (all parts) to smart manufacturing 6.1 General Figures Figure 1 – The IEC 62443 series |
27 | 6.2 Relation to ISO/IEC 27000 (all parts) Figure 2 – Details of the application of individual parts of IEC 62443by different roles during the individual life cycles of automation assets |
28 | 6.3 Reference model 6.4 Foundational requirements |
29 | 6.5 Zones and conduits in system of systems 6.6 Security risk assessment and security levels 6.7 Security lifecycle |
30 | 6.8 Auditing and logging 6.9 Conclusion 7 Smart Manufacturing security threats 7.1 General |
31 | 7.2 Use case view on cybersecurity 7.2.1 General 7.2.2 Use case “Manufacturing of individualized products” Figure 3 – Use case “Manufacturing of individualized products” |
32 | Table 2 – Use case “Manufacturing of individualized products” |
33 | 7.2.3 Use case “Standardization of production technologies” Figure 4 – Use case “Standardization of production technologies” |
34 | 7.2.4 Use case “Flexible scheduling and resource allocation” Figure 5 – Use case “Flexible scheduling and resource allocation” Table 3 – Use case “Standardization of production technologies” |
35 | 7.2.5 Use case “Modularization of production system” Figure 6 – Use case “Modularization of production system” Table 4 – Use case “Flexible Scheduling and resource allocation” |
36 | Table 5 – Use case “Modularization of production system” |
37 | 7.2.6 Use case “Feedback loops” |
38 | 7.2.7 Use case “Simulation in operation” Figure 7 – Use case “Feedback loops” Table 6 – Use Case “Feedback loops” |
39 | Figure 8 – Use case “Simulation in operation” Table 7 – Use case “Simulation in operation” |
40 | 7.2.8 Use case “Simulation in design and engineering” 7.2.9 Use cases “Update and functional scalability of production resources” and “Device configuration” Figure 9 – Use case “Simulation in design and engineering” Table 8 – Use case “Simulation in design and engineering” |
41 | 7.2.10 Use case “Information extraction from production systems” Table 9 – Use case “Update and functional scalability of production resources”,Use case “Device configuration” |
42 | Figure 10 – Use case “Information extraction from production systems” Table 10 – Use case “Information extraction from production systems” |
43 | 7.2.11 Use case “Self-optimization of production resources”Use case “Optimization of operation through machine learning”Use case “Optimization in design and engineering through machine learning” 7.2.12 Use case “Design for energy efficiency”Use case “Optimization of energy” Table 11 – Use case “Machine learning” |
44 | 7.2.13 Use case “Seamless models” Table 12 – Use case “Design for energy efficiency”, Use case “Optimization of energy” |
45 | 7.3 Smart Manufacturing lifecycle view on cybersecurity Figure 11 – From Value Streams to Value Networks Table 13 – Use case “Seamless models” |
46 | 8 Summary of challenges 8.1 General Table 14 – Smart Manufacturing Lifecycle View on Cybersecurity |
47 | 8.2 Identification and Authentication Control (AC) 8.3 Use Control (UC) Table 15 – Identification and Authentication Control (AC) challenges |
48 | Figure 12 – Lifecycles, users/stakeholders, granted privileges, and views Table 16 – Use Control (UC) challenges |
49 | 8.4 Data and System Integrity (DI) Table 17 – Data and System Integrity (DI) challenges |
50 | 8.5 Data Confidentiality (DC) 8.5.1 General 8.5.2 Intended Use Figure 13 – Privacy and Intended Use Table 18 – Data Confidentiality (DC) challenges regarding privacy |
51 | 8.5.3 Data Confidentiality 8.6 Restricted Data Flow (RDF) 8.7 Timely Response to Events (TRE) Table 19 – Data Confidentiality (DC) requirements other than privacy Table 20 – Restricted Data Flow (RDF) challenges |
52 | 8.8 Resource Availability (RA) Table 21 – Timely Response to Events (TRE) challenges Table 22 – Resource Availability (RA) challenges |
53 | Annex A (informative)Mapping use cases to foundational requirements Table A.1 – Mapping use cases to foundational requirements |
54 | Annex B (informative)Secure identities |
55 | Bibliography |