Vážení zákazníci, v letošním roce budeme expedovat poslední objednávky ve středu 18. 12. 2024.

Těšíme se s vámi na shledanou od pondělí 06. 01. 2025.

 

Menu
0
Total price
0 €
PRICES include / exclude VAT
Homepage>BS EN IEC 62443-2-1:2024 Security for industrial automation and control systems Security program requirements for IACS asset owners
Sponsored link
sklademVydáno: 2024-09-27
BS EN IEC 62443-2-1:2024 Security for industrial automation and control systems Security program requirements for IACS asset owners

BS EN IEC 62443-2-1:2024

Security for industrial automation and control systems Security program requirements for IACS asset owners

Format
Availability
Price and currency
Anglicky Secure PDF
Immediate download
407.33 €
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
40.73 €
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
122.20 €
Anglicky Hardcopy
In stock
407.33 €
Označení normy:BS EN IEC 62443-2-1:2024
Počet stran:96
Vydáno:2024-09-27
ISBN:978 0 539 00502 8
Status:Standard
DESCRIPTION

BS EN IEC 62443-2-1:2024


This standard BS EN IEC 62443-2-1:2024 Security for industrial automation and control systems is classified in these ICS categories:
  • 25.040.40 Industrial process measurement and control
  • 35.100.05 Multilayer applications
  • 35.030 IT Security
IEC 62443-2-1:2024 specifies asset owner security program (SP) policy and procedure requirements for an industrial automation and control system (IACS) in operation. This document uses the broad definition and scope of what constitutes an IACS as described in IEC TS 62443‑1‑1. In the context of this document, asset owner also includes the operator of the IACS. This document recognizes that the lifespan of an IACS can exceed twenty years, and that many legacy systems contain hardware and software that are no longer supported. Therefore, the SP for most legacy systems addresses only a subset of the requirements defined in this document. For example, if IACS or component software is no longer supported, security patching requirements cannot be met. Similarly, backup software for many older systems is not available for all components of the IACS. This document does not specify that an IACS has these technical requirements. This document states that the asset owner needs to have policies and procedures around these types of requirements. In the case where an asset owner has legacy systems that do not have the native technical capabilities, compensating security measures can be part of the policies and procedures specified in this document. This edition includes the following significant technical changes with respect to the previous edition: a) revised requirement structure into SP elements (SPEs), b) revised requirements to eliminate duplication of an information security management system (ISMS), and c) defined a maturity model for evaluating requirements.