iec-62443-compliance-checklist-industrial-networks infographic 1
iec-62443-compliance-checklist-industrial-networks infographic 2

TL;DR

IEC 62443 is the global standard for industrial automation and control system (IACS) cybersecurity. This checklist provides a practical, step-by-step guide for achieving compliance across network architecture, device hardening, access control, and monitoring — with specific tool and configuration recommendations for each requirement.

Understanding IEC 62443

IEC 62443 is a family of standards developed by ISA (International Society of Automation) and adopted by IEC (International Electrotechnical Commission). Unlike single-document standards, IEC 62443 is organized into four series addressing different stakeholders:

Series Focus Target Audience
62443-1-x General concepts, terminology All stakeholders
62443-2-x Policies and procedures Asset owners, operators
62443-3-x System security requirements System integrators
62443-4-x Component security requirements Product vendors

Security Levels (SL) define the rigor of protection:

Level Threat Actor Example Environment
SL 1 Casual or coincidental Office network adjacent to OT
SL 2 Intentional, low resources Standard manufacturing
SL 3 Sophisticated, moderate resources Critical infrastructure, utilities
SL 4 State-sponsored, extensive resources National defense, nuclear

Compliance Checklist: Network Architecture (62443-3-3)

Zone and Conduit Design:

  • [ ] Define security zones based on criticality and function
  • [ ] Establish conduits (controlled communication paths) between zones
  • [ ] Deploy industrial firewalls at every zone boundary
  • [ ] Document all inter-zone data flows and protocols
  • [ ] Implement DMZ between enterprise IT and OT networks

Network Segmentation Implementation:

Requirement Implementation Verification
Zone isolation VLAN per zone on managed switches Inter-VLAN traffic blocked by default
Conduit control EDR-G9010 firewall rules per conduit Only approved protocols/ports pass
Redundancy Turbo Ring for network resilience <50ms failover verified
DMZ Dual-firewall DMZ architecture No direct IT-to-OT paths

Compliance Checklist: Access Control (62443-3-3 FR 1-2)

Foundational Requirement 1 — Identification and Authentication:

  • [ ] Unique user accounts for all personnel (no shared logins)
  • [ ] Role-based access control (RBAC) configured on all network devices
  • [ ] Multi-factor authentication for remote access connections
  • [ ] Account lockout after 5 failed attempts
  • [ ] Automated session timeout for inactive connections (15 min default)

Foundational Requirement 2 — Use Control:

  • [ ] Least privilege principle: users access only required zones/devices
  • [ ] Separate accounts for administrative and operational functions
  • [ ] Privileged access management for engineering workstations
  • [ ] Vendor/contractor access limited to specific time windows

Compliance Checklist: System Integrity (62443-3-3 FR 3-4)

  • [ ] Firmware integrity verification before deployment (cryptographic hash)
  • [ ] Secure boot enabled on all supporting devices
  • [ ] Configuration backup automated and stored offline
  • [ ] Change management process for all OT device configurations
  • [ ] Software whitelisting on HMIs and engineering workstations

Compliance Checklist: Data Confidentiality (62443-3-3 FR 4)

  • [ ] Encrypted communication for all remote access (IPsec VPN minimum)
  • [ ] TLS/SSL for web-based management interfaces
  • [ ] SNMPv3 (encrypted) replacing SNMPv1/v2c on all managed devices
  • [ ] Secure protocols for data historian communication

Compliance Checklist: Monitoring and Logging (62443-3-3 FR 6)

  • [ ] Continuous network monitoring deployed across all zones
  • [ ] Security event logging enabled on firewalls, switches, and gateways
  • [ ] Centralized log collection with tamper-proof storage
  • [ ] Automated alerting for unauthorized access attempts and policy violations
  • [ ] Regular log review procedures (minimum weekly for critical zones)
Monitoring Requirement Tool Configuration
Network topology MXview One Auto-discovery, SNMP polling
Traffic analysis EDR-G9010 DPI logs Protocol-specific rule logging
Device health Managed switch SNMP traps Port status, temperature, PoE
Access audit RADIUS/TACACS+ Centralized authentication logs

Compliance Checklist: Component Security (62443-4-2)

When selecting industrial networking equipment, verify these IEC 62443-4-2 component requirements:

Requirement Specification Moxa Compliance
Secure boot Cryptographic firmware verification ✓ EDR-G9010 Series
Least functionality Disable unused services/ports ✓ All managed switches
Authentication Local + RADIUS/TACACS+ ✓ EDS/IKS managed series
Audit logging Event logs with timestamps ✓ All managed devices
Communication integrity TLS, SSH, SNMPv3 ✓ All managed devices

Cybersecurity & Reliability

Security Layer IEC 62443 FR Implementation
Network FR 5 (Restricted Data Flow) Zone/conduit architecture with EDR firewalls
Access FR 1-2 (Auth + Use Control) RBAC, MFA, RADIUS on managed switches
Integrity FR 3 (System Integrity) Secure boot, firmware verification
Monitoring FR 6 (Timely Response) MXview One, centralized logging
Availability SL Targets Turbo Ring redundancy, hardware bypass

Product cards auto-generated by shopmoxa_scraper.py

Conclusion

IEC 62443 compliance is achievable through systematic implementation of zone-and-conduit architecture, role-based access control, and continuous monitoring. Start with a gap assessment against your target security level, then prioritize network segmentation as the highest-impact control. For IEC 62443 gap assessments or network architecture design assistance, contact Neteon's industrial security team.

Frequently Asked Questions

Q: Is IEC 62443 certification mandatory? A: Certification is not universally mandatory but is increasingly required by procurement specifications in power (NERC CIP references it), oil and gas, and government contracts. Many asset owners require IEC 62443-4-2 certified components.

Q: What security level should my facility target? A: Most manufacturing facilities target SL 2 (protection against intentional attacks with low resources). Critical infrastructure (power grids, water treatment) should target SL 3. SL 4 is typically reserved for national security applications.

Q: How long does IEC 62443 compliance take? A: Initial compliance for a medium-sized facility typically takes 6-12 months for SL 2 and 12-24 months for SL 3, depending on the baseline maturity of existing OT security controls.

Q: Can I achieve IEC 62443 compliance without replacing legacy equipment? A: Yes. Compensating controls like network segmentation, industrial firewalls with DPI, and monitoring can protect legacy zones. The firewall becomes the security boundary, allowing non-compliant devices to operate within a protected zone.

Q: What is the difference between IEC 62443 and NIST SP 800-82? A: IEC 62443 is an international standard with certification programs and specific security levels. NIST SP 800-82 is US-government guidance for ICS security. They are complementary — NIST 800-82 Rev 3 explicitly maps to IEC 62443 requirements.