BSI PD CLC IEC/TR 63069:2020
$167.15
Industrial-process measurement, control and automation. Framework for functional safety and security
Published By | Publication Date | Number of Pages |
BSI | 2020 | 36 |
This document explains and provides guidance on the common application of IEC 61508 (all parts) and IEC 62443 (all parts) in the area of industrial-process measurement, control and automation.
This document can apply to other industrial sectors where IEC 61508 (all parts) and IEC 62443 (all parts) are applied.
NOTE Usage or reference of this document for industry specific sector standards is encouraged.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
5 | Annex ZA(normative)Normative references to international publicationswith their corresponding European publications |
6 | CONTENTS |
8 | FOREWORD |
10 | INTRODUCTION 0.1 Purpose of this document 0.2 Background 0.3 Issues on the terminology 0.4 Target audience |
11 | 1 Scope 2 Normative references 3 Terms, definitions, symbols, abbreviated terms and conventions 3.1 Terms and definitions defined for this document |
19 | 3.2 Abbreviated terms 3.3 Explanation for common terms with different definitions Tables Table 1 – Terms with multiple definitions |
24 | 4 Context of security related to functional safety 4.1 Description of functions 4.2 Security environment Figures Figure 1 – Overview of functions of an IACS |
25 | Figure 2 – Safety domain and security domain Figure 3 – Security environment |
26 | 5 Guiding principles 6 Life cycle recommendations for co-engineering 6.1 General |
27 | Figure 4 – Safety and security interaction |
28 | Table 2 – Recommended activities in life cycle stages |
29 | 6.2 Managing security related safety aspects 7 Risk assessment considerations 7.1 Risk assessment at higher level |
30 | 7.2 Trade-off analysis 7.3 Considerations for threat-risk assessment 7.3.1 General Figure 5 – Safety and security risk assessments as part ofa risk assessment at higher level |
31 | 7.3.2 Recommendations to the threat-risk assessment 7.3.3 Considerations related to security countermeasures 7.3.4 Vulnerabilities and examples of root causes 7.4 Malevolent and unauthorized actions 7.4.1 General |
32 | 7.4.2 Reasonably foreseeable misuse (safety) 7.4.3 Prevention of malevolent and unauthorized actions (security) 7.4.4 Combination of password protection measures 8 Incident response readiness and incident handling 8.1 General 8.2 Incident response readiness 8.3 Incident handling |
34 | Bibliography |