Shopping Cart

No products in the cart.

BSI PD CLC IEC/TR 63069:2020

$167.15

Industrial-process measurement, control and automation. Framework for functional safety and security

Published By Publication Date Number of Pages
BSI 2020 36
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This document explains and provides guidance on the common application of IEC 61508 (all parts) and IEC 62443 (all parts) in the area of industrial-process measurement, control and automation.

This document can apply to other industrial sectors where IEC 61508 (all parts) and IEC 62443 (all parts) are applied.

NOTE Usage or reference of this document for industry specific sector standards is encouraged.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 Annex ZA(normative)Normative references to international publicationswith their corresponding European publications
6 CONTENTS
8 FOREWORD
10 INTRODUCTION
0.1 Purpose of this document
0.2 Background
0.3 Issues on the terminology
0.4 Target audience
11 1 Scope
2 Normative references
3 Terms, definitions, symbols, abbreviated terms and conventions
3.1 Terms and definitions defined for this document
19 3.2 Abbreviated terms
3.3 Explanation for common terms with different definitions
Tables
Table 1 – Terms with multiple definitions
24 4 Context of security related to functional safety
4.1 Description of functions
4.2 Security environment
Figures
Figure 1 – Overview of functions of an IACS
25 Figure 2 – Safety domain and security domain
Figure 3 – Security environment
26 5 Guiding principles
6 Life cycle recommendations for co-engineering
6.1 General
27 Figure 4 – Safety and security interaction
28 Table 2 – Recommended activities in life cycle stages
29 6.2 Managing security related safety aspects
7 Risk assessment considerations
7.1 Risk assessment at higher level
30 7.2 Trade-off analysis
7.3 Considerations for threat-risk assessment
7.3.1 General
Figure 5 – Safety and security risk assessments as part ofa risk assessment at higher level
31 7.3.2 Recommendations to the threat-risk assessment
7.3.3 Considerations related to security countermeasures
7.3.4 Vulnerabilities and examples of root causes
7.4 Malevolent and unauthorized actions
7.4.1 General
32 7.4.2 Reasonably foreseeable misuse (safety)
7.4.3 Prevention of malevolent and unauthorized actions (security)
7.4.4 Combination of password protection measures
8 Incident response readiness and incident handling
8.1 General
8.2 Incident response readiness
8.3 Incident handling
34 Bibliography
BSI PD CLC IEC/TR 63069:2020
$167.15