The international standard IEC 62443 was created to lay the foundation of cybersecurity robustness. It aims to mitigate risks for industrial communication networks by defining procedures for implementing electronically secure plants, facilities and systems across industries.
The various standards of IEC 62443 are dedicated both to ICS manufacturers as well as to integrators and end users. For component and product manufacturers, compliance to IEC 62443 can help demonstrate the security of your systems and components and enhance your market position. We offer assessments focused on
your product and manufacturing development procedures (following IEC 62443-4-1) as well as on the security functionalities and robustness of the individual product components (following IEC 62443-4-2).
For Industrial Control System (ICS) integrators and users of control systems, compliance to IEC 62443 is a powerful way to achieve increased brand protection and expanded competitive advantage.
We help support those efforts with assessments of your procedures and policies, following IEC 62443-2-4. Moreover, we offer an assessment for organizations integrating ICS systems and components in which we verify the secure way in which these products are deployed within the network, following IEC 62443-3-3.
During an interactive training or tailored workshop, we will empower you to make educated choices based on the IEC 62443 family of standards, taking into account issues related to control and automation systems. The course will dive into industry best practices and the evidence you would need to deliver to your customers.
- Gap analysis
We can provide a constructive review that will provide you with the differences between your current and desired state for meeting IEC 62443 sub-standards. Results will be provided in a gap analysis report that can be customized to include testing if necessary or requested.
- System security architecture review
We can identify the potential risks or gaps relative to IEC 62443 sub-standards, which we will then take into account to conduct your customized security design and architecture review.
- Penetration testing
Our penetration tests provide clear insights into the security level of your product, system and infrastructure. After the penetration test, you will receive a report with the results of the test including demonstrated vulnerabilities within your product, system and infrastructure.
We can assess and certify system integrators and maintenance service providers to give assurance to plant owners and operators. We offer a choice of assessment and certification options to respond to your needs in the most efficient and sustainable way.
- Surveillance and inspection
Our surveillance and inspection services help verify if you took sufficient security measures to maintain your certification status. At the end of the inspection, you will receive a report with the results you can use to determine the right actions that will help ensure the security level meets the set goals.
Get started today