IEC TR 62443-3-1 : 1.0

IEC TR 62443-3-1 : 1.0

INDUSTRIAL COMMUNICATION NETWORKS - NETWORK AND SYSTEM SECURITY - PART 3-1: SECURITY TECHNOLOGIES FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS

International Electrotechnical Committee

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$31.20

$78.00

(price reduced by 60 %)

Table of Contents

FOREWORD<br>INTRODUCTION<br>1 Scope <br>2 Normative references<br>3 Terms, definitions and acronyms<br>&nbsp;&nbsp;&nbsp;3.1 Terms and definitions<br>&nbsp;&nbsp;&nbsp;3.2 Acronyms <br>4 Overview <br>5 Authentication and authorization technologies <br>&nbsp;&nbsp;&nbsp;5.1 General <br>&nbsp;&nbsp;&nbsp;5.2 Role-based authorization tools <br>&nbsp;&nbsp;&nbsp;5.3 Password authentication <br>&nbsp;&nbsp;&nbsp;5.4 Challenge/response authentication<br>&nbsp;&nbsp;&nbsp;5.5 Physical/token authentication <br>&nbsp;&nbsp;&nbsp;5.6 Smart card authentication<br>&nbsp;&nbsp;&nbsp;5.7 Biometric authentication<br>&nbsp;&nbsp;&nbsp;5.8 Location-based authentication <br>&nbsp;&nbsp;&nbsp;5.9 Password distribution and management technologies<br>&nbsp;&nbsp;&nbsp;5.10 Device-to-device authentication <br>6 Filtering/blocking/access control technologies <br>&nbsp;&nbsp;&nbsp;6.1 General <br>&nbsp;&nbsp;&nbsp;6.2 Network firewalls <br>&nbsp;&nbsp;&nbsp;6.3 Host-based firewalls<br>&nbsp;&nbsp;&nbsp;6.4 Virtual Networks<br>7 Encryption technologies and data validation<br>&nbsp;&nbsp;&nbsp;7.1 General <br>&nbsp;&nbsp;&nbsp;7.2 Symmetric (secret) key encryption <br>&nbsp;&nbsp;&nbsp;7.3 Public key encryption and key distribution <br>&nbsp;&nbsp;&nbsp;7.4 Virtual private networks (VPNs) <br>8 Management, audit, measurement, monitoring, and <br>&nbsp;&nbsp;&nbsp;detection tools <br>&nbsp;&nbsp;&nbsp;8.1 General <br>&nbsp;&nbsp;&nbsp;8.2 Log auditing utilities <br>&nbsp;&nbsp;&nbsp;8.3 Virus and malicious code detection systems<br>&nbsp;&nbsp;&nbsp;8.4 Intrusion detection systems (IDS)<br>&nbsp;&nbsp;&nbsp;8.5 Vulnerability scanners<br>&nbsp;&nbsp;&nbsp;8.6 Forensics and analysis tools (FAT)<br>&nbsp;&nbsp;&nbsp;8.7 Host configuration management tools (HCM) <br>&nbsp;&nbsp;&nbsp;8.8 Automated software management tools (ASM) <br>9 Industrial automation and control systems computer<br>&nbsp;&nbsp;&nbsp;software<br>&nbsp;&nbsp;&nbsp;9.1 General <br>&nbsp;&nbsp;&nbsp;9.2 Server and workstation operating systems <br>&nbsp;&nbsp;&nbsp;9.3 Real-time and embedded operating systems <br>&nbsp;&nbsp;&nbsp;9.4 Web technologies <br>10 Physical security controls <br>&nbsp;&nbsp;&nbsp;10.1 General <br>&nbsp;&nbsp;&nbsp;10.2 Physical protection <br>&nbsp;&nbsp;&nbsp;10.3 Personnel security <br>Annex A (informative) Trade name declarations<br>Bibliography

Abstract

Gives a current assessment of various cybersecurity tools, mitigation counter-measures, and technologies that may effectively apply to the modern electronically based IACSs regulating and monitoring numerous industries and critical infrastructures.

General Product Information

Document Type Standard
Status Current
Publisher International Electrotechnical Committee
Committee TC 65

Contact us