BSI PD CLC IEC/TS 63074:2024
$167.15
Safety of machinery. Security aspects related to functional safety of safety-related control systems
Published By | Publication Date | Number of Pages |
BSI | 2024 | 36 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
5 | Annex ZA (normative)Normative references to international publicationswith their corresponding European publications |
6 | CONTENTS |
8 | FOREWORD |
10 | INTRODUCTION |
11 | 1 Scope 2 Normative references |
12 | 3 Terms, definitions, and abbreviated terms 3.1 Terms and definitions |
16 | 3.2 Abbreviated terms 4 Safety and security overview 4.1 General 4.2 Safety objectives |
17 | 4.3 Security objectives |
18 | Figures Figure 1 – Relationship between threat(s), vulnerabilities, consequence(s)and security risk(s) for SCS performing safety function(s) Figure 2 – Possible effects of security risk(s) to an SCS |
19 | 5 Security aspects related to functional safety 5.1 General 5.1.1 Security risk assessment |
20 | 5.1.2 Security risk response strategy 5.2 Security countermeasures 5.2.1 General |
21 | Table 1 – Overview of foundational requirements and possible influence(s) on an SCS |
22 | 5.2.2 Identification and authentication 5.2.3 Use control 5.2.4 System integrity 5.2.5 Data confidentiality |
23 | 5.2.6 Restricted data flow 5.2.7 Timely response to events 5.2.8 Resource availability 6 Cybersecurity and functional safety of machinery 6.1 General 6.2 Aspects related to the protection against corruption |
24 | 6.3 Security countermeasures against corruption 6.3.1 General 6.3.2 Potential sources of cyber threats 6.3.3 Multi-factor authentication 6.3.4 Network architecture |
25 | 6.3.5 Portable devices 6.3.6 Wireless communication 6.3.7 Remote access |
26 | 6.3.8 Attack through direct physical connection 7 Verification and maintenance of security countermeasures 8 Information for the user of the machine(s) |
27 | Annex A (informative)Basic information related to threats and threat modelling approach A.1 Evaluation of threats |
28 | A.2 Examples of threat related to a safety-related device |
29 | Figure A.1 – Safety-related device and possible accesses |
30 | Annex B (informative)Security risk assessment triggers B.1 General B.2 Event driven triggers |
31 | Annex C (informative)Example of information flow between device supplier, manufacturerof machine, integrator and user of machine C.1 General C.2 Example 1 – Design phase of the machine C.3 Example 2 – Use phase of the machine Figure C.1 – Example of generic information flow during design phase |
32 | Figure C.2 – Example of generic information flow during use phase Figure C.3 – Example of information flow during use phase in context of IEC 62443-2-4 |
33 | Bibliography |