ISA TR62443-2-3 PDF

ISA TR62443-2-3 PDF

Name:
ISA TR62443-2-3 PDF

Published Date:
07/01/2015

Status:
[ Active ]

Description:

Security for industrial automation and control systems, Part 2-3: Patch management in the IACS environment

Publisher:
The International Society of Automation

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$113.1
Need Help?

ISA-TR62443-2-3 describes requirements for asset owners and industrial automation and control system (IACS) product suppliers that have established and are now maintaining an IACS patch management program.

This Technical Report recommends a defined format for the distribution of information about security patches from asset owners to IACS product suppliers, a definition of some of the activities associated with the development of the patch information by IACS product suppliers and deployment and installation of the patches by asset owners. The exchange format and activities are defined for use in security related patches; however, it may also be applicable for non-security related patches or updates.

The Technical Report does not differentiate between patches made available for the operating systems (OSs), applications or devices. It does not differentiate between the product suppliers that supply the infrastructure components or the IACS applications; it provides guidance for all patches applicable to the IACS. Additionally, the type of patch can be for the resolution of bugs, reliability issues, operability issues or security vulnerabilities.

Note 1 This Technical Report does not provide guidance on the ethics and approaches for the discovery and disclosure of security vulnerabilities affecting IACS. This is a general issue outside the scope of this report.

Note 2 This Technical Report does not provide guidance on the mitigation of vulnerabilities in the period between when the vulnerability is discovered and the date that the patch resolving the vulnerability is created. For guidance on multiple countermeasures to mitigate security risks as part of an IACS security management system (IACS-SMS), refer to Annexes B.4.5, B.4.6 and B.8.5 in this Technical Report and other documents in the ISA-62443 series.


Edition : 15
File Size : 1 file , 1.2 MB
Number of Pages : 70
Published : 07/01/2015

History


Related products

ISA TR77.60.04
Published Date: 11/26/2013
Fossil Fuel Power Plant Human-Machine Interface - Electronic Screen Displays
$26.1
ISA RP60.8
Published Date: 06/28/1978
Electrical Guide for Control Centers
$17.4
ISA 12.12.01
Published Date: 11/17/2015
Nonincendive Electrical Equipment for Use in Class I and II, Division 2 and Class III, Divisions 1 and 2 Hazardous (Classified) Locations
$39.3
ISA 67.02.01
Published Date: 11/29/2021
Nuclear Safety-Related Instrument-Sensing Line Piping and Tubing Standard for Use in Nuclear Power Plants
$42.9

Best-Selling Products

Risk Management
Published Date: 01/01/1995
$9.6