ISA/IEC 62443 Standards - Part 4

62443-2-1:2024 Standard updates and more. [Securing Things by M. Yousuf Faisal]

Disclaimer: All views presented here, in this newsletter, are my own.

Author or the newsletter are not liable for any actions taken by any individual or any organization / business / entity. The information provided is for education and awareness purposes only and is not specific to any business and or situation.

M. Yousuf Faisal

Hello there,

This is Part-4 of a multi-part series on ISA/IEC 62443 standards overview - and will be expanding further on the standards, talking about the a key updates to part of the standard series, i.e., ISA/IEC 62443-2-1:2024 release updates and more.

In case you missed, here’s Part 1, Part 2 and Part 3 we covered basics around:

  • introduction & background about the standards series,

  • key stakeholders, IACS roles & responsibilities,

  • 4 groups of standards requirements,

  • 3 phase IACS Cybersecurity Lifecycle,

  • ISA Secure Certifications for Suppliers, Products, Asset owners & individuals,

  • important terms, definitions & relationships,

  • Standards series introduction (of each standard part),

  • Standards elements, security levels, & types of standards requirements.

  • Foundational Requirements (FRs) and its relationships with System Requirements (SRs) and Component Requirements (CRs)

  • Zones, Sub-zones and conduits.

Quick test: Try to recall the 4 groups in the standards series using the tip from Part 1. If you can't, click the Part 1 link for a reminder. Hope this helps!

But before we begin, do me a favour and make sure you hit the “Subscribe” button to let me know that you care or liked and keep me motivated to publish more. Thanks!

Together with:

Daily News for Curious Minds

Be the smartest person in the room by reading 1440! Dive into 1440, where 4 million Americans find their daily, fact-based news fix. We navigate through 100+ sources to deliver a comprehensive roundup from every corner of the internet – politics, global events, business, and culture, all in a quick, 5-minute newsletter. It's completely free and devoid of bias or political influence, ensuring you get the facts straight. Subscribe to 1440 today.

IEC 62443-2-1:2024 - Standard updated 📜 

International Society of Automation (ISA) and International Electrotechnical Commission (IEC), recently released, the second edition of the ISA/IEC 62443-2-1:2024 standard, updating IACS security standards, outlining essential security program elements (policies and procedures) for IACS asset owners.

This second edition replaces the 2010 first edition and is technical revision.

The ANSI/ISA-62443-2-1-2024 standard, developed by ISA99 and IEC Technical Committee 65, outlines requirements for implementing security in industrial systems using technical, physical, procedural, and compensatory measures.

Created with global cybersecurity experts input, offer a flexible framework to address security vulnerabilities in IACS across all industry sectors and critical infrastructure.

IEC 62443-2-1:2024 Updates / Changes 

Aligned with the ISA-62443-1-1 definition of IACS, there’s an emphasizing on shared security responsibilities to ensures consistency with industry best practices and expands 'asset owner' to include IACS operators as well.

The latest edition includes major technical changes to the previous edition such as:

  • A revised requirement structure into Security Program Elements (SPEs),

  • Several revised requirements to eliminate duplication of an information security management system (ISMS),

  • defined a maturity model for evaluating compliance with the requirements, streamlining the framework and enhancing security program assessment.

  • flexible requirements for creating and improving security programs to reduce IACS security risks, allowing asset owners to choose the best approaches for their needs.

  • outlines the required security capabilities for the secure operation of an IACS.

  • While the asset owner is accountable, service providers and product suppliers often support implementation. It also guides asset owners in stating security requirements for these parties, referencing the ISA‐62443 series.

CSMS (Cyber Security Management System) is no more?

The new standard completely overhauls the old one, replacing the term CSMS (Cyber Security Management System) with Security Program (SP). This refers to a Management System for implementing cybersecurity in Industrial Automation and Control Systems.

The new version advises aligning the Security Program (SP) with the organization's existing ISMS to avoid duplication, as most large IT systems already have one.

ANSI/ISA-62443-2-1-2024 acknowledges that IACS can last over twenty years, with many legacy systems having unsupported hardware and software.

The ANSI/ISA-62443-2-1-2024 document doesn't specify technical requirements for IACS but requires asset owners to have policies for such needs.

Consequently, the SP for most legacy systems covers only a subset of the document's requirements.

If the IACS or component software is unsupported, security patches can't be applied, and backup software for older systems may be unavailable.

For legacy systems lacking technical capabilities, compensating security measures should be included in these policies.

Related Offer:

Current iteration of my OT-CBPRS toolkit - Perfect for small to medium-sized regional or global manufacturers! This toolkit outlines OT cybersecurity best practices requirements specification. It sets a baseline and offers complementary support for your OT security policy needs. Use it to establish upfront requirements for any new OT security projects and watch your security soar!

Next iteration of my OT-CBPRS toolkit will include an OT Security Policy document as well for an additional amount and these requirements more closely aligned towards ISA/IEC 62443-2-1 requirements.

Get ready to supercharge your OT security! Dive into the OT-CBPRS toolkit and register your interest now to craft the ultimate policy and requirements specification. Don't miss out on this offer to uplift your OT Cybersecurity Program!

Read more about → OT/ICS Cybersecurity Requirements Specification for SMB Manufacturers [Securing Things by M. Yousuf Faisal].

Summary of few other changes in IEC 62443 standard series in 2024:

  • The categories have increased from 4 to 6, but Category 5 is reserved for future use, with no documents currently assigned to it.

  • IEC 62443-1-5 has been released. It deals with Security Profiles. In future, typical security profiles for different applications, will be released with the nomenclature of IEC 62443-5-x, where x could be 1,2, 3, etc for different application or industry profile documents.

  • IEC 62443-4-3, initially for IIoT devices, is now IEC 62443-1-6 in category 1 and remains in draft mode.

  • IEC 62443-6-1 has been released. It is an evaluation guide for third party assessors to examine compliance to IEC 62443-2-4.

We’ll conclude part 4 here.

Stay tuned to find out more in Part 5 - ISA/IEC 62443 Standards Series Overview in a future newsletter edition, in which we’ll cover, cybersecurity risk assessments using 62443-3-2 and 3-3, applicability of different parts of the standard across the cybersecurity lifecycle phases, and more.

References

  • ISA main website → https://www.isa.org/

  • Announcement on the 62443-2-1 updated → https://www.isa.org/news-press-releases/2025/january/update-to-isa-iec-62443-standards-addresses-organi

  • ISA Global Cybersecurity Alliance (ISAGCA) → https://gca.isa.org/resources. e.g.:

    • Quick Start Guide to ISA/IEC 62443

    • IoT Security Maturity Model: 62443 Mappings for Asset Owners and Product Suppliers

    • and more…

My Recent Most Viewed Social Posts:

In case you’ve missed - here are some of my recent most viewed social posts.

Ways in which I can help?

Whenever you are ready - I can help you with:

A - IT & OT Cybersecurity Advisory / Consulting services - for securing your business and or its digital transformation journey.

B - Security Awareness Training & Phishing Awareness Portal - Train your staff and build a Security awareness program through our subscription based service.

C - Securing Things Academy (STA) - Security trainings for IT & OT practitioners.

Visit the newsletter website for Links to above services and or reach out at info[at]securingthings[dot]com or DM me via LinkedIn.

D - Securing Things Newsletter - Sponsor this newsletter to showcase your brand globally, or subscribe to simply Get Smarter at Securing Things.

Reach out at newsletter[at]securingthings[dot]com or DM me via LinkedIn.

Feedback

I invite #SecuringThings community to share their feedback.

Your feedback and input is invaluable to me as we work together to strengthen our cybersecurity defenses and create a safer and smarter digital society. Thank you for your trust and continued support.

Do register, validate your email, and request login link to submit poll to be able to enter a chance to win a future course giveaway. Also:

Rate the newsletter content

Did you find the content valuable?

Login or Subscribe to participate in polls.

Thanks for reading - until the next edition!

It’s a Great Day to Start Securing Things for a Smart & Safer Society.

Take care and Best Regards,

Follow Securing Things on LinkedIn | X/Twitter & YouTube.

Reply

or to participate.