Structure of IEC 62443
IEC 62443 is the international reference standard for Industrial Cyber Security of components and systems developed in conformity with ISA/IEC requirements.
Read moreObtain Industrial Cybersecurity certification according to the IEC 62443 ISASecure® standard through an efficient process guided by our team of specialists.
According to IEC 17065 and IEC 17025 standards
Discover more
Conformity of a system or component with the requirements of the IEC 62443 standard
Discover more
BYHON is a certification body and accredited laboratory, according to IEC 17065 and IEC 17025 standards, that implements ISASecure® certification processes and provides conformity assessments aimed at certifying Industrial Cybersecurity according to the IEC 62443 standard through the ISASecure® scheme with license number ISCI-CL0005.
All ISASecure® certification options based on product type:
Watch the video explaining the technical scheme and how to obtain the ISASecure® certificate.
Industrial Cyber Security is the part of the overall security of an Industrial Automation and Control System (IACS) that depends on the proper security development lifecycle used by product suppliers, where products include DCS and SCADA systems, and components such as embedded devices and software applications.
IEC 62443 is the international standard for the security of industrial automation and control systems. It was developed to protect industry and make data sharing and system operations safe and reliable, reducing the risk of cyber threats, equipment failures, production downtime, unexpected costs, and profit loss.
IACS stands for Industrial Automation Control System, also known as ICS (Industrial Control System). In a broader sense, IACS is synonymous with OT (Operations Technology), as it refers to technology that interfaces with an operational process. Examples of IACS include industrial devices such as PLCs, HMIs, and SCADAs.
The IACS Security Lifecycle is the security lifecycle of an IACS: the set of phases that must be carried out in order for IACS protection to comply with the Cyber Security requirements defined by the IEC standard. The phases of the IACS Security Lifecycle are Assess, Implement, and Maintain.
The CSMS (Cyber Security Management System) represents the set of practices and actions aimed at identifying cyber risks and defining the most appropriate countermeasures.
The Assess Phase consists of a set of activities aimed at identifying high-level risks and analyzing vulnerabilities and low-level risks. It includes Risk Assessment, Vulnerability Assessment, Penetration Test, Threat Modeling, and Security Level Allocation. This phase ends with the allocation of the minimum Cyber Security requirements required for each component of the IACS system.
During the Implement Phase, companies wishing to protect themselves from cyberattacks define the entire CSMS (Cyber Security Management System) and adopt procedures and strategies aimed at preventing cyberattacks and protecting their industrial control systems. Key activities include Defense Strategy, CSMS, and Security Level Verification.
Cyber Security is a process that needs to be constantly monitored and periodically implemented through maintenance activities related to the security level of industrial plants. The Maintain Phase is therefore dedicated to preserving security performance over time and includes activities such as Auditing and Follow up.