{"id":435372,"date":"2024-10-20T07:49:16","date_gmt":"2024-10-20T07:49:16","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-ts-62443-1-12009\/"},"modified":"2024-10-26T14:49:02","modified_gmt":"2024-10-26T14:49:02","slug":"bsi-pd-iec-ts-62443-1-12009","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-ts-62443-1-12009\/","title":{"rendered":"BSI PD IEC\/TS 62443-1-1:2009"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
4<\/td>\nBlank Page <\/td>\n<\/tr>\n
5<\/td>\nCONTENTS <\/td>\n<\/tr>\n
8<\/td>\nFOREWORD <\/td>\n<\/tr>\n
10<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
1.1 General
1.2 Included functionality
1.3 Systems and interfaces <\/td>\n<\/tr>\n
12<\/td>\n1.4 Activity-based criteria
1.5 Asset-based criteria <\/td>\n<\/tr>\n
13<\/td>\n2 Normative references
3 Terms, definitions and abbreviations
3.1 General
3.2 Terms and definitions <\/td>\n<\/tr>\n
29<\/td>\n3.3 Abbreviations <\/td>\n<\/tr>\n
30<\/td>\n4 The situation
4.1 General
4.2 Current systems <\/td>\n<\/tr>\n
31<\/td>\n4.3 Current trends
4.4 Potential impact <\/td>\n<\/tr>\n
32<\/td>\n5 Concepts
5.1 General
5.2 Security objectives
Figure 1 \u2013 Comparison of objectives between IACS and general IT systems <\/td>\n<\/tr>\n
33<\/td>\n5.3 Foundational requirements
5.4 Defence in depth
5.5 Security context <\/td>\n<\/tr>\n
34<\/td>\nFigure 2 \u2013 Context element relationships
Figure 3 \u2013 Context model <\/td>\n<\/tr>\n
35<\/td>\n5.6 Threat-risk assessment <\/td>\n<\/tr>\n
36<\/td>\nTable 1 \u2013 Types of loss by asset type <\/td>\n<\/tr>\n
42<\/td>\n5.7 Security program maturity <\/td>\n<\/tr>\n
43<\/td>\nFigure 4 \u2013 Integration of business and IACS cybersecurity
Figure 5 \u2013 Cybersecurity level over time <\/td>\n<\/tr>\n
44<\/td>\nFigure 6 \u2013 Integration of resources to develop the CSMS <\/td>\n<\/tr>\n
46<\/td>\nTable 2 \u2013 Security maturity phases
Table 3 \u2013 Concept phase
Table 4 \u2013 Functional analysis phase <\/td>\n<\/tr>\n
47<\/td>\nTable 5 \u2013 Implementation phase
Table 6 \u2013 Operations phase <\/td>\n<\/tr>\n
48<\/td>\n5.8 Policies
Table 7 \u2013 Recycle and disposal phase <\/td>\n<\/tr>\n
53<\/td>\n5.9 Security zones <\/td>\n<\/tr>\n
54<\/td>\n5.10 Conduits <\/td>\n<\/tr>\n
55<\/td>\nFigure 7 \u2013 Conduit example <\/td>\n<\/tr>\n
56<\/td>\n5.11 Security levels
Table 8 \u2013 Security levels <\/td>\n<\/tr>\n
60<\/td>\n5.12 Security level lifecycle <\/td>\n<\/tr>\n
61<\/td>\nFigure 8 \u2013 Security level lifecycle <\/td>\n<\/tr>\n
62<\/td>\nFigure 9 \u2013 Security level lifecycle \u2013 Assess phase <\/td>\n<\/tr>\n
63<\/td>\nFigure 10 \u2013 Security level lifecycle \u2013 Implement phase <\/td>\n<\/tr>\n
64<\/td>\n6 Models
6.1 General
Figure 11 \u2013 Security level lifecycle \u2013 Maintain phase <\/td>\n<\/tr>\n
65<\/td>\n6.2 Reference models
Figure 12 \u2013 Reference model for IEC 62443 standards <\/td>\n<\/tr>\n
66<\/td>\nFigure 13 \u2013 SCADA reference model <\/td>\n<\/tr>\n
68<\/td>\n6.3 Asset models <\/td>\n<\/tr>\n
69<\/td>\nFigure 14 \u2013 Process manufacturing asset model example <\/td>\n<\/tr>\n
70<\/td>\nFigure 15 \u2013 SCADA system asset model example <\/td>\n<\/tr>\n
72<\/td>\n6.4 Reference architecture
6.5 Zone and conduit model
Figure 16 \u2013 Reference architecture example <\/td>\n<\/tr>\n
74<\/td>\nFigure 17 \u2013 Multiplant zone example <\/td>\n<\/tr>\n
75<\/td>\nFigure 18 \u2013 Separate zones example <\/td>\n<\/tr>\n
76<\/td>\nFigure 19 \u2013 SCADA zone example <\/td>\n<\/tr>\n
77<\/td>\nFigure 20 \u2013 SCADA separate zones example <\/td>\n<\/tr>\n
80<\/td>\nFigure 21 \u2013 Enterprise conduit <\/td>\n<\/tr>\n
81<\/td>\nFigure 22 \u2013 SCADA conduit example <\/td>\n<\/tr>\n
82<\/td>\n6.6 Model relationships <\/td>\n<\/tr>\n
83<\/td>\nFigure 23 \u2013 Model relationships <\/td>\n<\/tr>\n
84<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Industrial communication networks. Network and system security – Terminology, concepts and models<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n86<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":435381,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[658,2641],"product_tag":[],"class_list":{"0":"post-435372","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-040-01","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/435372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/435381"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=435372"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=435372"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=435372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}