Vážení zákazníci, v letošním roce budeme expedovat poslední objednávky ve středu 18. 12. 2024.

Těšíme se s vámi na shledanou od pondělí 06. 01. 2025.

 

Cena s DPH / bez DPH
Hlavní stránka>BS EN IEC 62443-2-1:2024 Security for industrial automation and control systems Security program requirements for IACS asset owners
Sponsored link
sklademVydáno: 2024-09-27
BS EN IEC 62443-2-1:2024 Security for industrial automation and control systems Security program requirements for IACS asset owners

BS EN IEC 62443-2-1:2024

Security for industrial automation and control systems Security program requirements for IACS asset owners

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
10230 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
1023.00 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
3069.00 Kč
Anglicky Tisk
Skladem
10230 Kč
Označení normy:BS EN IEC 62443-2-1:2024
Počet stran:96
Vydáno:2024-09-27
ISBN:978 0 539 00502 8
Status:Standard
Popis

BS EN IEC 62443-2-1:2024


This standard BS EN IEC 62443-2-1:2024 Security for industrial automation and control systems is classified in these ICS categories:
  • 25.040.40 Industrial process measurement and control
  • 35.100.05 Multilayer applications
  • 35.030 IT Security
IEC 62443-2-1:2024 specifies asset owner security program (SP) policy and procedure requirements for an industrial automation and control system (IACS) in operation. This document uses the broad definition and scope of what constitutes an IACS as described in IEC TS 62443‑1‑1. In the context of this document, asset owner also includes the operator of the IACS. This document recognizes that the lifespan of an IACS can exceed twenty years, and that many legacy systems contain hardware and software that are no longer supported. Therefore, the SP for most legacy systems addresses only a subset of the requirements defined in this document. For example, if IACS or component software is no longer supported, security patching requirements cannot be met. Similarly, backup software for many older systems is not available for all components of the IACS. This document does not specify that an IACS has these technical requirements. This document states that the asset owner needs to have policies and procedures around these types of requirements. In the case where an asset owner has legacy systems that do not have the native technical capabilities, compensating security measures can be part of the policies and procedures specified in this document. This edition includes the following significant technical changes with respect to the previous edition: a) revised requirement structure into SP elements (SPEs), b) revised requirements to eliminate duplication of an information security management system (ISMS), and c) defined a maturity model for evaluating requirements.