OT Security
26.May.2025

Building a More Resilient OT Security Framework with IEC 62443‑3‑2 & 3‑3

Share:
Industrial control (OT, Operational Technology) environments often feature aging equipment running continuously, unable to update as frequently as IT systems, leading to cybersecurity gaps. When OT systems are compromised, the impact extends beyond operations—it may threaten human safety. Recent cyber incidents targeting critical infrastructure sectors like manufacturing, energy, and transportation highlight that OT security must be a top priority.

Norris Chen, Senior Engineer at DEKRA Onward Security’s Cybersecurity Assessment Division, explains that the IEC 62443-3-2 and 3-3 standards are essential frameworks for securing critical infrastructure, including manufacturing, energy, and transportation. By applying systematic risk assessment and security controls, organizations can build a more resilient OT security perimeter.

Norris elaborates that IEC 62443 takes a holistic, risk-based approach to cybersecurity in OT. Rather than a single standard, it’s a comprehensive framework comprised of key modules:
  • 2-1: Security Management System (SMS)
  • 3-2: Risk Assessment & Security Design Methods
  • 3-3: System-Level Security Requirements
  • 4-1: Secure Software Development Lifecycle (SSDLC)
  • 4-2: Component-Level Security Requirements

These modules help organizations implement security across three dimensions: governance, systems, and product development. Whether you’re a manager, system architect, or device developer, this framework provides the tools and rationales needed to enforce robust cybersecurity.

Integrating IT and OT security, IEC 62443 offers a consistent methodology that helps Taiwanese industries bolster critical infrastructure resilience and align with international compliance standards.
 

IEC 62443‑3‑3: Seven Foundational Security Requirements for OT Systems

透過 IEC 62443-3-2 與 3-3 標準打造更具韌性的工控系統防護網
IEC 62443-3-3 defines seven foundational requirements (FRs) to ensure core cybersecurity for industrial control systems:
  1. IAC – Identification & Authentication Control: Ensure users are correctly identified and authenticated.
  2. UC – Use Control: Manage user access to system functions.
  3. SI – System Integrity: Prevent unauthorized modification of data/systems.
  4. DC – Data Confidentiality: Protect sensitive information from unauthorized access.
  5. RDF – Restrict Data Flow: Control network communication paths to prevent unauthorized data transfer.
  6. TRE – Timely Response to Events: Enable quick detection and handling of security incidents.
  7. RA – Resource Availability: Ensure critical systems remain operational and protected from service disruption.


Dual Evaluation of OT Security Capabilities

IEC 62443 assesses cybersecurity readiness via two complementary axes:
  • Security Level (SL) (per 3-3 & 4-2): evaluates the technical ability to withstand threats.
  • Maturity Level (ML) (per 4-1 & 2-4): evaluates the maturity of supplier or integrator security processes.

Practical Considerations for OT Security Implementation:
  1. Role of External Components
    OT security depends not only on the control system itself but also on integrated components such as centralized authentication servers, SIEM systems, firewalls, and network monitoring tools. These external elements reinforce the core system and enhance overall protection.
  2. Balancing Security Level and Operability
    As Norris notes: “A higher security level isn’t always better.” In high-availability environments, overly strict controls, such as multi-factor authentication for high IAC levels, could prevent operators from accessing systems during emergencies, creating operational risks. The framework encourages compensating controls (e.g., enhanced physical security, thorough personnel background checks, and dual-operator requirements) when strict security could hinder essential operations.
 

Continuous Improvement Over One-Time Compliance

Norris emphasizes that cybersecurity threats are constantly evolving, and IEC 62443 should be viewed as a continuous improvement framework, not just a checkbox for compliance. Security designs must balance risk versus practicality, align with real business needs and environmental contexts, and avoid blind pursuit of the highest security level. Only through periodic risk assessments and control updates can organizations maintain OT system resilience in dynamic threat landscapes.
Building a More Resilient OT Security Framework with IEC 62443‑3‑2 & 3‑3

Inquiry

Contact Us
Thank you for visiting us. Please leave your contact information, and we will reply you as soon as we can.
  • Onward Security is committed to your privacy. Your information won't be shared with third parties and is used to contact you about relevant content. You may unsubscribe at any time. For more info, please read our Privacy Policy. By clicking below submit button, you consent to allow Onward Security to store and process the personal information submitted above to provide you the content requested.

Why Onward Security

In-depth Cybersecurity Techniques+

  • Uncovered 40+ zero-day vulnerabilities (CVE)
  • Discovered 3000+ IoT product vulnerabilities

Dedicated to IoT Product Security+

  • 200+ cybersecurity projects in IoT industry
  • Tested 1000+ IoT product security

Global Compliance and Certification Capability+

  • 500+ customers / 20+ countries certification obtained
  • Compliance experience in Automotive, Consumer, Industrial, and Medical industry
Subscribe to Newsletter:

Verification

Click the numbers in sequence.

WeChat
This site uses cookies to improve your experience and to provide content customized specifically to your interests. By continuing to browse our site without changing your cookie settings (click the Privacy Policy button for more info), or by clicking the Continue button, you hereby acknowledge and agree to our privacy policy and use of cookies.