SL 1 is a basic industrial cybersecurity security level focused on deterring casual or accidental misuse, not targeted attacks.
SL 1 is a cybersecurity security level commonly used in industrial control system standards to describe protection against casual or accidental misuse, rather than deliberate, well-resourced attacks.
In industrial and OT cybersecurity, Security Level 1 (SL 1) usually refers to the lowest defined level of protection in a multi-level scheme (often SL 1 through SL 4). It typically includes:
SL 1 generally assumes that an attacker has limited motivation, limited skills, and limited resources. It is not intended to address targeted, sophisticated, or persistent cyber attacks.
In regulated manufacturing and critical infrastructure, SL 1 is often applied to:
Risk-based architectures may mix different SLs across zones and conduits. Some systems or zones may appropriately target SL 1, while others require SL 2, SL 3, or higher, depending on criticality and risk.
Security levels, including SL 1, are commonly associated with industrial cybersecurity frameworks and standards. These schemes define capability requirements for each level in areas such as access control, data integrity, system availability, and change management. The detailed criteria vary by standard, but the intent of SL 1 remains a baseline of protection against non-targeted threats.
In practice, specifying SL 1 for a system or zone typically means:
For OT, MES, and integrated IT/OT systems, SL 1 serves as a reference point for scoping security controls and for explaining why some systems should not be expected to meet higher levels such as SL 3 or SL 4.
When deciding whether a system should aim for SL 1, SL 2, or higher, organizations typically consider:
Within a risk-based security program, SL 1 is a deliberate design choice for low-risk environments, rather than a default for all systems.