{"id":435372,"date":"2024-10-20T07:49:16","date_gmt":"2024-10-20T07:49:16","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-ts-62443-1-12009\/"},"modified":"2024-10-26T14:49:02","modified_gmt":"2024-10-26T14:49:02","slug":"bsi-pd-iec-ts-62443-1-12009","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-ts-62443-1-12009\/","title":{"rendered":"BSI PD IEC\/TS 62443-1-1:2009"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 1.1 General 1.2 Included functionality 1.3 Systems and interfaces <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1.4 Activity-based criteria 1.5 Asset-based criteria <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 2 Normative references 3 Terms, definitions and abbreviations 3.1 General 3.2 Terms and definitions <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 3.3 Abbreviations <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 4 The situation 4.1 General 4.2 Current systems <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 4.3 Current trends 4.4 Potential impact <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5 Concepts 5.1 General 5.2 Security objectives Figure 1 \u2013 Comparison of objectives between IACS and general IT systems <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 5.3 Foundational requirements 5.4 Defence in depth 5.5 Security context <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Figure 2 \u2013 Context element relationships Figure 3 \u2013 Context model <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 5.6 Threat-risk assessment <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Table 1 \u2013 Types of loss by asset type <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 5.7 Security program maturity <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Figure 4 \u2013 Integration of business and IACS cybersecurity Figure 5 \u2013 Cybersecurity level over time <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Figure 6 \u2013 Integration of resources to develop the CSMS <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Table 2 \u2013 Security maturity phases Table 3 \u2013 Concept phase Table 4 \u2013 Functional analysis phase <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Table 5 \u2013 Implementation phase Table 6 \u2013 Operations phase <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 5.8 Policies Table 7 \u2013 Recycle and disposal phase <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 5.9 Security zones <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 5.10 Conduits <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Figure 7 \u2013 Conduit example <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 5.11 Security levels Table 8 \u2013 Security levels <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 5.12 Security level lifecycle <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Figure 8 \u2013 Security level lifecycle <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | Figure 9 \u2013 Security level lifecycle \u2013 Assess phase <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | Figure 10 \u2013 Security level lifecycle \u2013 Implement phase <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 6 Models 6.1 General Figure 11 \u2013 Security level lifecycle \u2013 Maintain phase <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 6.2 Reference models Figure 12 \u2013 Reference model for IEC 62443 standards <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | Figure 13 \u2013 SCADA reference model <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 6.3 Asset models <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | Figure 14 \u2013 Process manufacturing asset model example <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Figure 15 \u2013 SCADA system asset model example <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 6.4 Reference architecture 6.5 Zone and conduit model Figure 16 \u2013 Reference architecture example <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | Figure 17 \u2013 Multiplant zone example <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | Figure 18 \u2013 Separate zones example <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | Figure 19 \u2013 SCADA zone example <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | Figure 20 \u2013 SCADA separate zones example <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | Figure 21 \u2013 Enterprise conduit <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | Figure 22 \u2013 SCADA conduit example <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 6.6 Model relationships <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | Figure 23 \u2013 Model relationships <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Industrial communication networks. Network and system security – Terminology, concepts and models<\/b><\/p>\n |