IEC 62443 defines seven high-level security Foundational Requirements (FRs) for industrial automation and control systems (IACS). They describe what must be protected, not a single technology stack. Implementation always depends on your specific assets, vendors, network design, and regulatory and validation constraints.
Ensure that all users, software processes, and devices are uniquely identifiable and authenticated before they can access system resources.
In practice this may include:
In brownfield environments, FR1 is frequently limited by legacy controllers that do not support modern identity mechanisms, shared terminals on the shop floor, and incomplete integration with corporate identity providers. Workarounds (badges, physical controls, procedural controls) must be designed and documented carefully.
Limit what authenticated users or processes are allowed to do based on their roles and responsibilities.
Typical elements:
In regulated manufacturing, FR2 interacts directly with qualification and validation. Tightening roles can change system behavior and may require re-validation or documented impact assessment. Many plants implement FR2 incrementally to avoid large, disruptive requalification efforts.
Protect system functions and data from unauthorized modification and detect attempts to tamper with them.
Examples include:
In long-lifecycle environments, vendors may not support frequent patching or modern hardening on older operating systems. Many facilities rely on compensating controls (network segmentation, strict change control, offline backups) to fulfill the intent of FR3 without destabilizing validated systems.
Prevent unauthorized disclosure of sensitive information in transit and at rest.
Common measures:
In many industrial control systems, data confidentiality has historically been weaker than integrity and availability. Retrofitting encryption into legacy protocols can be difficult or impossible without gateways. Decisions usually require balancing confidentiality against performance, determinism, vendor support, and validation constraints.
Control how data moves between zones and conduits to reduce exposure and limit the blast radius of incidents.
This typically includes:
In brownfield plants with many point-to-point connections and undocumented integrations, FR5 often requires gradual remediation: discovery, documentation, then staged tightening. Aggressive segmentation without deep understanding of dependencies can disrupt production or break validated data flows.
Detect security-relevant events and respond to them in a timeframe that limits impact.
Practical elements include:
Full SIEM integration and continuous monitoring are not always realistic for all OT assets, especially very old controllers. Many organizations start with a smaller set of critical systems and key conduits, then expand coverage as tooling, budget, and validation bandwidth allow.
Ensure that critical system resources remain available, even under fault or attack conditions, and that loss of availability is limited and recoverable.
Key aspects:
For validated and safety-critical systems, availability controls must be designed so that security failures do not create unacceptable process or safety risks. Any changes to redundancy, failover, or recovery behavior usually need formal impact assessment and, in many regulated plants, revalidation.
The seven Foundational Requirements are goals, not a fixed technology recipe. In most real plants:
Effective use of IEC 62443 usually means:
The standard provides a structured way to reason about security posture. The specific controls, technologies, and timelines are highly plant-specific and should be aligned with your risk appetite, regulatory environment, and operational realities.
Whether you're managing 1 site or 100, C-981 adapts to your environment and scales with your needs—without the complexity of traditional systems.