The implementation of robust authentication & authorization mechanisms is a fundamental step in protecting iacs from potential cyber threats and is integral to the overall cybersecurity strategy outlined by the iec 62443 standards.

IEC 62443 and zero trust

March 25, 2025
There’s a fundamental shift in security philosophy that requires a change in mindset

The most referenced document in the IEC 62443 cybersecurity series is IEC 62443-3-3, “System security requirements and security levels.” Jointly developed with ISA 99, it details technical control system requirements (SR) associated with seven foundational requirements (FR):

  1. Identification and authentication ensure only authorized users and devices can access the system.
  2. Use control defines what actions authorized users and devices can perform within the system.
  3. System integrity ensures system and components aren’t corrupted.
  4. Data confidentiality protects sensitive information from unauthorized disclosure.
  5. Restricted data flow controls the flow of information in the system and between different systems.
  6. Timely response to events makes sure the system can respond to security events.
  7. Resource availability guarantees the system and its resources are available to authorized users when needed.

Get your subscription to Control's tri-weekly newsletter.

IEC 62443-3-3 was issued in 2013 and defined the requirements for control system security levels. Though the standard is now more than a decade old, its foundational requirements shouldn’t change. Likewise, the zone and conduit model introduced by ISA-99 in 2007 and incorporated into the IEC 62443 series is widely accepted for developing and maintaining industrial control environments.

Most IT and IoT systems are also pushing to implement zero-trust protections. Their core requirements are:  

Continuous verification: every access request, regardless of origin (inside or outside the network), must be explicitly verified and authorized.

Least privilege access: users and devices only have the absolute minimum permissions necessary to perform their required tasks.

Assume breach: users act as if it already occurred, and focus on containing the impact of any successful intrusion.

Zero trust is a fundamental shift in security philosophy that requires a change in mindset, and a commitment to continuous verification and least-privilege access. While zero trust isn't a specific legal requirement in all cases, it's becoming the de facto standard for federal cybersecurity. Its principles are likely to influence future regulations and best practices.

“Zero trust is a fundamental shift in security philosophy that requires a change in mindset, and a commitment to continuous verification and least-privilege access.”

Europe has two key pieces of cybersecurity legislation: NIS2 directive and the Cyber Resilience Act that reference the zero trust.

The National Institute of Standards and Technology (NIST) integrates zero trust as a core component of its comprehensive Cybersecurity Framework (CSF). Organizations can use the CSF as a general roadmap, and then leverage specific guidance in SP 800-207 to implement zero trust in their overall network. Another way to look at it is: CSF is the overall blueprint for your cybersecurity architecture, and zero trust is a critical security system you install within that architecture to protect your valuable assets.

Similarly, defense-in-depth cybersecurity strategy provides a foundation for zero trust. The multiple layers of security in a defense-in-depth strategy become the components that zero trust uses to enforce its "never trust, always verify" principle down to a zone of one device, one port and one application.

Defense-in-depth is about building multiple layers of security, while zero trust is about continuously verifying every access attempt. If you consider a zone of one element, as might be the case for an IoT or IIoT device providing an input via a SCADA or other control system, then IEC 62443’s seven foundational requirements not only support the principles of zero trust, but also provide solid recommendations about how to implement it.

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...